Results 11 to 20 of about 8,341 (195)

Secure transmission of correlated sources over broadcast channels with ultra-low latency

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Correlated sources passing through broadcast channels is considered in this paper. Each receiver has access to correlated source side information and each source at the sender is kept secret from the unintended receiver.
Hehe Chen, Ping Zhu
doaj   +1 more source

Feeding Back the Output or Sharing the State: Which Is Better for the State-Dependent Wiretap Channel?

open access: yesEntropy, 2015
In this paper, the general wiretap channel with channel state information (CSI) at the transmitter and noiseless feedback is investigated, where the feedback is from the legitimate receiver to the transmitter, and the CSI is available at the transmitter ...
Bin Dai, Zheng Ma, Linman Yu
doaj   +1 more source

New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages [PDF]

open access: yes, 2011
This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the problem of the MIMO Gaussian wiretap channel is revisited.
Liu, Ruoheng   +3 more
core   +1 more source

Source-Channel Secrecy with Causal Disclosure [PDF]

open access: yes, 2012
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul   +3 more
core   +1 more source

Secure Lossy Source Coding with Side Information at the Decoders [PDF]

open access: yes, 2010
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referred to as Bob) and the eavesdropper (referred to as Eve).
Piantanida, Pablo, Villard, Joffrey
core   +2 more sources

On Secure Transmission over Parallel Relay Eavesdropper Channel [PDF]

open access: yes, 2010
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent relay-eavesdropper channels as subchannels. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region.
Awan, Zohaib Hassan   +2 more
core   +3 more sources

On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels

open access: yes, 2017
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates ...
Aram, Siamak   +3 more
core   +1 more source

Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel

open access: yes, 2011
We consider transmission over a wiretap channel where both the main channel and the wiretapper's channel are Binary Erasure Channels (BEC). We propose a code construction method using two edge type LDPC codes based on the coset encoding scheme.
Andersson, Mattias   +4 more
core   +1 more source

Cooperation with an Untrusted Relay: A Secrecy Perspective

open access: yes, 2009
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help.
He, Xiang, Yener, Aylin
core   +2 more sources

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy