Results 21 to 30 of about 95,453 (278)

Atmospheric Turbulence-Controlled Cryptosystems

open access: yesIEEE Photonics Journal, 2021
To overcome the limitations of QKD, post-quantum cryptography, and computational security-based cryptography protocols in this paper, an atmospheric turbulence-controlled cryptosystem is proposed.
Ivan B. Djordjevic
doaj   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security [PDF]

open access: yes, 2016
Wireless communication provides a wide coverage at the cost of exposing information to unintended users. As an information-theoretic paradigm, secrecy rate derives bounds for secure transmission when the channel to the eavesdropper is known.
Chatzinotas, Symeon   +4 more
core   +2 more sources

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment

open access: yesIEEE Access, 2023
The interaction between the physical world and information technologies creates advantages and novel emerging threats. Cyber-physical systems (CPSs) result vulnerable to cyber-related disruptive scenarios, and, for some critical systems, cyber failures ...
Francesco Simone   +3 more
doaj   +1 more source

Safety analysis of Civil aviation Flight and UAV Operation based on STAMP/STPA [PDF]

open access: yesE3S Web of Conferences
In order to prevent the occurrence of dangerous approaches or accidents in the low-altitude UAV conflict resolution process, the security problem in the process was transformed into the control problem, and a conflict resolution security analysis method ...
Liu Tianyu, liu Jin
doaj   +1 more source

Analysis of short blocklength codes for secrecy

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models and analyze their secrecy performance over several cases of concatenated code designs.
Willie K. Harrison   +3 more
doaj   +1 more source

Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
32-bit software implementations become increasingly popular for embedded security applications. As a result, profiling 32-bit target intermediate values becomes increasingly needed to evaluate their side-channel security.
Gaëtan Cassiers   +3 more
doaj   +1 more source

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

An information-theoretic security proof for QKD protocols

open access: yes, 2005
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found.
A. Rényi   +10 more
core   +2 more sources

Home - About - Disclaimer - Privacy