Results 81 to 90 of about 2,245 (194)

Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection -- Secure DoF and Jammer Scaling Law

open access: yes, 2013
In this paper, we propose opportunistic jammer selection in a wireless security system for increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate receiver (say, Alice and Bob).
Choi, Wan, Lee, Jung Hoon
core   +1 more source

Enhancing Satellite Link Security Against Drone Eavesdropping Through Cooperative Communication

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 1, Page 10-22, January/February 2025.
ABSTRACT Integrated satellite terrestrial networks (ISTNs) are emerging as a promising next‐generation communication technology, for example, B5G and 6G, with low‐earth orbit (LEO) satellites playing a growing role. However, the complex and unique characteristics of ISTNs make them more susceptible to cyberattacks.
Rajnish Kumar, Shlomi Arnon
wiley   +1 more source

Secure Performance Analysis of Satellite-Terrestrial Networks-Assisted Backscatter Device

open access: yesJordanian Journal of Computers and Information Technology
This study investigates the secrecy performance of a satellite–backscatter device communication system in the presence of a potential eavesdropper.
Hong Nhu Nguyen   +4 more
doaj   +1 more source

Artificial Noise Aided Precoding With Imperfect CSI in Full-Duplex Relaying Secure Communications

open access: yesIEEE Access, 2018
In Rayleigh fading channels, to enhance the secrecy performance of wireless communication systems and efficiently disturb the interception of eavesdroppers, the multiple-antenna source node utilizes the artificial noise aided precoding (ANP) strategy ...
Yuanjian Li   +4 more
doaj   +1 more source

Linear Precoding for Broadcast Channels with Confidential Messages under Transmit-Side Channel Correlation

open access: yes, 2013
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.   +3 more
core   +1 more source

Fat‐tailed DSGE models: A survey and new results

open access: yesJournal of Economic Surveys, Volume 39, Issue 1, Page 146-171, February 2025.
Abstract We review recent advances in dynamic stochastic general equilibrium theory concerned with the emergence of fat‐tailed time‐series distributions. Focusing on mechanisms that are firmly grounded in structural equilibrium models, we provide a common reference framework to organize existing contributions according to whether they entail extreme ...
Chetan Dave, Marco M. Sorge
wiley   +1 more source

The Book of Genesis and other allegorical origin stories of games

open access: yesOrbis Litterarum, Volume 80, Issue 1, Page 1-18, February 2025.
Abstract This essay delves into the complex interplay between the sacred and the ludic, with a particular emphasis on allegorical origin stories from various religious and mythological traditions, highlighting their portrayal of games and the concept of play. The analysis includes the Judaeo‐Christian Book of Genesis and the Babylonian Enuma Elish.
Bo Kampmann Walther
wiley   +1 more source

Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods

open access: yesDigital Communications and Networks, 2019
Massive Multiple Input Multiple Output (MIMO) has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.
Kishan Neupane, Rami J. Haddad
doaj   +1 more source

Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying

open access: yesIEEE Access, 2020
The two-way relaying (TWR) technique has been confirmed to achieve higher spectral efficiency and average sum rate compared with the one-way relaying (OWR) technique in ultra-dense next generation networks with limited spectal resources.
Mona Awad   +5 more
doaj   +1 more source

Secrecy Through Synchronization Errors

open access: yes, 2015
In this paper, we propose a transmission scheme that achieves information theoretic security, without making assumptions on the eavesdropper's channel. This is achieved by a transmitter that deliberately introduces synchronization errors (insertions and ...
Castiglione, Jason, Kavcic, Aleksandar
core   +1 more source

Home - About - Disclaimer - Privacy