Results 241 to 250 of about 95,937 (277)
Some of the next articles are maybe not open access.

Information-theoretic security in wireless multicasting

International Conference on Electrical & Computer Engineering (ICECE 2010), 2010
In this paper, a wireless multicast scenario is considered in which the transmitter sends a common message to a group of client receivers through quasi-static Rayleigh fading channel in the presence of an eavesdropper. The communication between transmitter and each client receiver is said to be secured if the eavesdropper is unable to decode any ...
Md. Zahurul I. Sarkar   +1 more
openaire   +1 more source

Information-Theoretic Secure Multiparty Computation

2013
Most of this book has considered two-party and multiparty computation with security with (unfair) abort. This security notion allows the adversary to force the honest parties to abort even depending on the outputs of corrupted parties. (Note, however, that the adversary is not allowed to bias the output of honest parties in any other manner.) This ...
Maurer Ueli, Zikas Vassilis
openaire   +1 more source

Theoretical aspects of information security

Journal of Mathematical Sciences, 2009
We construct a formal model of a security control system for an automated system and analyze errors in making decisions concerning the system’s security level under conditions of partial information availability.
openaire   +1 more source

Wireless Information-Theoretic Security in MANETs

2013 IEEE International Conference on Communications Workshops (ICC), 2013
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs ...
Theofilos Chrysikos   +2 more
openaire   +1 more source

Hash Functions and Information Theoretic Security

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009
Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic attack costs and real costs.
Nasour BAGHERI   +3 more
openaire   +1 more source

Information Theoretic Security

Foundations and Trends® in Communications and Information Theory, 2007
Shlomo Shamai (Shitz)   +2 more
openaire   +2 more sources

Information Theoretic Security and Privacy of Information Systems

2017
Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways
openaire   +1 more source

An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications

IEEE Journal on Selected Areas in Information Theory, 2021
Matthieu R Bloch   +2 more
exaly  

Home - About - Disclaimer - Privacy