Results 31 to 40 of about 95,453 (277)

Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes

open access: yesСистеми обробки інформації, 2022
The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security.
Р.В. Корольов   +4 more
doaj   +1 more source

Semantically Secure Lattice Codes for Compound MIMO Channels [PDF]

open access: yes, 2018
We consider compound multi-input multi-output (MIMO) wiretap channels where minimal channel state information at the transmitter (CSIT) is assumed.
Belfiore, Jean-Claude   +2 more
core   +2 more sources

Secure Polar Coding for the Primitive Relay Wiretap Channel

open access: yesEntropy, 2021
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics ...
Manos Athanasakos, George Karagiannidis
doaj   +1 more source

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information [PDF]

open access: yes, 2012
This paper addresses the problem of resilient consensus in the presence of misbehaving nodes. Although it is typical to assume knowledge of at least some nonlocal information when studying secure and fault-tolerant consensus algorithms, this assumption ...
Koutsoukos, Xenofon   +3 more
core   +4 more sources

Identity Authentication over Noisy Channels

open access: yesEntropy, 2015
Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy ...
Fanfan Zheng   +4 more
doaj   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

A simple relation of guessing probability in quantum key distribution

open access: yesNew Journal of Physics, 2022
Given a communication system using quantum key distribution (QKD), the receiver can be seen as one who tries to guess the sender’s information just as potential eavesdroppers do.
Hong-Yi Su
doaj   +1 more source

Private Key and Decoder Side Information for Secure and Private Source Coding

open access: yesEntropy, 2022
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü   +3 more
doaj   +1 more source

A Distortion Based Approach for Protecting Inferences

open access: yes, 2017
Eavesdropping attacks in inference systems aim to learn not the raw data, but the system inferences to predict and manipulate system actions. We argue that conventional information security measures can be ambiguous on the adversary's estimation ...
Agarwal, Gaurav Kumar   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy