Results 51 to 60 of about 18,041 (194)
When is a Function Securely Computable? [PDF]
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication.
Gupta, Piyush +2 more
core +1 more source
Tuning the Phase Structure and Electrical Properties of BNKT‐Based Ceramics via Li+ Doping
Li+‐doped Bi0.5[Na0.84‐xK0.16Lix]0.5TiO3 lead‐free piezoelectric ceramics are fabricated. The optimized composition delivers a high piezoelectric coefficient d33 and elevated depolarization temperature Td. It also shows large electrostrain and high Curie temperature, greatly extending the working temperature range for BNT‐based piezoelectric ...
Guangzhi Dong +9 more
wiley +1 more source
Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels
In this paper, we study the impacts of transmit antenna selection on the secrecy performance of massive MIMO systems. We consider a wiretap setting in which a fixed number of transmit antennas are selected and then confidential messages are transmitted ...
Asaad, Saba +4 more
core +1 more source
To Obtain or not to Obtain CSI in the Presence of Hybrid Adversary [PDF]
We consider the wiretap channel model under the presence of a hybrid, half duplex adversary that is capable of either jamming or eavesdropping at a given time.
Basciftci, Y. Ozan +2 more
core +1 more source
Trading Zones Between Thick and Thin: Anthropological Description as Scaffold or Mosaic
ABSTRACT Referring to the work of historian of science Peter Galison, I argue that anthropology requires thin description as an essential counterpart for thick description. Thin accounts provide the scaffolding within which thick descriptions sit. Galison uses the idea of a “trading zone” connecting different communities who, despite their differences (
David Zeitlyn
wiley +1 more source
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +1 more source
A frequency domain time-reversal (TR) precoder is proposed to perform physical layer security in single-input single-output (SISO) systems using orthogonal frequency-division multiplexing (OFDM) and artificial noise (AN) injection. This scheme guarantees
Sidney J. Golstein +4 more
doaj +1 more source
Utilization of Spatially Distributed mHVSR to Assess the Effectiveness of Ground Response Analysis
One‐dimensional ground response analyses (GRAs) can introduce model error to site response estimates when wave propagation is not dominated by vertically propagating shear waves. We investigate whether the variability of spatially distributed microtremor‐based horizontal‐to‐vertical spectral ratios (mHVSR) is related to GRA effectiveness using data ...
Francisco Javier G. Ornelas +2 more
wiley +1 more source
Secure D2D underlaying cellular communication based on artificial noise assisted
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added ...
Xiao-lei KANG +2 more
doaj +2 more sources
This paper studies the design and performance analysis of relay-assisted satellite free-space optics (FSO) quantum key distribution (QKD) systems for secure vehicular networks.
Minh Quang Vu +3 more
doaj +1 more source

