Results 31 to 40 of about 95,937 (277)
Identity Authentication over Noisy Channels
Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy ...
Fanfan Zheng +4 more
doaj +1 more source
Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes
The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security.
Р.В. Корольов +4 more
doaj +1 more source
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser +19 more
core +1 more source
Consensus of Multi-Agent Networks in the Presence of Adversaries Using Only Local Information [PDF]
This paper addresses the problem of resilient consensus in the presence of misbehaving nodes. Although it is typical to assume knowledge of at least some nonlocal information when studying secure and fault-tolerant consensus algorithms, this assumption ...
Koutsoukos, Xenofon +3 more
core +4 more sources
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
Secure Polar Coding for the Primitive Relay Wiretap Channel
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics ...
Manos Athanasakos, George Karagiannidis
doaj +1 more source
Security in Cognitive Radio Networks
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core +1 more source
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe +5 more
core +2 more sources
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source
UNCONDITIONAL SECURITY BY THE LAWS OF CLASSICAL PHYSICS [PDF]
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional ...
Mingesz, Róbert Zoltán +7 more
core +2 more sources

