Results 81 to 90 of about 2,245 (194)
In this paper, we propose opportunistic jammer selection in a wireless security system for increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate receiver (say, Alice and Bob).
Choi, Wan, Lee, Jung Hoon
core +1 more source
Enhancing Satellite Link Security Against Drone Eavesdropping Through Cooperative Communication
ABSTRACT Integrated satellite terrestrial networks (ISTNs) are emerging as a promising next‐generation communication technology, for example, B5G and 6G, with low‐earth orbit (LEO) satellites playing a growing role. However, the complex and unique characteristics of ISTNs make them more susceptible to cyberattacks.
Rajnish Kumar, Shlomi Arnon
wiley +1 more source
Secure Performance Analysis of Satellite-Terrestrial Networks-Assisted Backscatter Device
This study investigates the secrecy performance of a satellite–backscatter device communication system in the presence of a potential eavesdropper.
Hong Nhu Nguyen +4 more
doaj +1 more source
Artificial Noise Aided Precoding With Imperfect CSI in Full-Duplex Relaying Secure Communications
In Rayleigh fading channels, to enhance the secrecy performance of wireless communication systems and efficiently disturb the interception of eavesdroppers, the multiple-antenna source node utilizes the artificial noise aided precoding (ANP) strategy ...
Yuanjian Li +4 more
doaj +1 more source
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y. +3 more
core +1 more source
Fat‐tailed DSGE models: A survey and new results
Abstract We review recent advances in dynamic stochastic general equilibrium theory concerned with the emergence of fat‐tailed time‐series distributions. Focusing on mechanisms that are firmly grounded in structural equilibrium models, we provide a common reference framework to organize existing contributions according to whether they entail extreme ...
Chetan Dave, Marco M. Sorge
wiley +1 more source
The Book of Genesis and other allegorical origin stories of games
Abstract This essay delves into the complex interplay between the sacred and the ludic, with a particular emphasis on allegorical origin stories from various religious and mythological traditions, highlighting their portrayal of games and the concept of play. The analysis includes the Judaeo‐Christian Book of Genesis and the Babylonian Enuma Elish.
Bo Kampmann Walther
wiley +1 more source
Massive Multiple Input Multiple Output (MIMO) has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.
Kishan Neupane, Rami J. Haddad
doaj +1 more source
Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying
The two-way relaying (TWR) technique has been confirmed to achieve higher spectral efficiency and average sum rate compared with the one-way relaying (OWR) technique in ultra-dense next generation networks with limited spectal resources.
Mona Awad +5 more
doaj +1 more source
Secrecy Through Synchronization Errors
In this paper, we propose a transmission scheme that achieves information theoretic security, without making assumptions on the eavesdropper's channel. This is achieved by a transmitter that deliberately introduces synchronization errors (insertions and ...
Castiglione, Jason, Kavcic, Aleksandar
core +1 more source

