Results 21 to 30 of about 363,353 (192)

Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems [PDF]

open access: yes, 2015
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network.
Chen, J.   +3 more
core   +2 more sources

Zero knowledge convincing protocol on quantum bit is impossible [PDF]

open access: yes, 2017
Consider two parties: Alice and Bob and suppose that Bob is given a qubit system in a quantum state $\phi$, unknown to him. Alice knows $\phi$ and she is supposed to convince Bob that she knows $\phi$ sending some test message.
Horodecki, Michal   +2 more
core   +3 more sources

Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

open access: yesEntropy, 2019
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper.
Dang The Hung   +4 more
doaj   +1 more source

A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning

open access: yesSensors, 2022
In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed.
Ping Xie   +5 more
doaj   +1 more source

A method of enciphering quantum states [PDF]

open access: yes, 2000
In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties.
Bennett C H   +12 more
core   +5 more sources

Security and Reliability Analysis of a Two-Way Half-Duplex Wireless Relaying Network Using Partial Relay Selection and Hybrid TPSR Energy Harvesting at Relay Nodes

open access: yesIEEE Access, 2020
In recent years, physical layer security has been considered as an effective method to enhance the information security beside the cryptographic techniques that are used in upper layers. In this paper, we provide the security analysis for a two-way relay
Duy-Hung Ha   +5 more
doaj   +1 more source

Physical Layer Security Analysis of Multi-Hop Hybrid RF/FSO System in Presence of Multiple Eavesdroppers

open access: yesIEEE Photonics Journal, 2022
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak   +4 more
doaj   +1 more source

Q-Learning-Based Power Allocation for Secure Wireless Communication in UAV-Aided Relay Network

open access: yesIEEE Access, 2021
Unmanned aerial vehicle (UAV)-aided wireless relay networks are at risk of eavesdropping activities due to their open nature. In this paper, we study the security of a UAV-aided selective relaying wireless network in which $N$ UAVs are employed as ...
Sidqy I. Alnagar   +2 more
doaj   +1 more source

A PHY Layer Security Analysis of a Hybrid High Throughput Satellite With an Optical Feeder Link

open access: yesIEEE Open Journal of the Communications Society, 2020
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40
Elmehdi Illi   +3 more
doaj   +1 more source

Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach

open access: yesIEEE Open Journal of Vehicular Technology, 2023
The highly dynamic nature of cognitive radio (CR) systems and their stringent latency requirements pose a significant challenge in the realization of efficient intelligent transport systems (ITS).
Esraa M. Ghourab   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy