Results 31 to 40 of about 95,937 (277)

Identity Authentication over Noisy Channels

open access: yesEntropy, 2015
Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy ...
Fanfan Zheng   +4 more
doaj   +1 more source

Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes

open access: yesСистеми обробки інформації, 2022
The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security.
Р.В. Корольов   +4 more
doaj   +1 more source

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information [PDF]

open access: yes, 2012
This paper addresses the problem of resilient consensus in the presence of misbehaving nodes. Although it is typical to assume knowledge of at least some nonlocal information when studying secure and fault-tolerant consensus algorithms, this assumption ...
Koutsoukos, Xenofon   +3 more
core   +4 more sources

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Secure Polar Coding for the Primitive Relay Wiretap Channel

open access: yesEntropy, 2021
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics ...
Manos Athanasakos, George Karagiannidis
doaj   +1 more source

Security in Cognitive Radio Networks

open access: yes, 2014
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Therapeutic Apheresis for Intravenous Methylprednisolone‐Refractory Neuromyelitis Optica Spectrum Disorder: Clinical and Radiological Outcomes in a Single‐Center Case Series

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi   +5 more
wiley   +1 more source

UNCONDITIONAL SECURITY BY THE LAWS OF CLASSICAL PHYSICS [PDF]

open access: yes, 2013
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional ...
Mingesz, Róbert Zoltán   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy