Results 21 to 30 of about 363,353 (192)
Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems [PDF]
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network.
Chen, J. +3 more
core +2 more sources
Zero knowledge convincing protocol on quantum bit is impossible [PDF]
Consider two parties: Alice and Bob and suppose that Bob is given a qubit system in a quantum state $\phi$, unknown to him. Alice knows $\phi$ and she is supposed to convince Bob that she knows $\phi$ sending some test message.
Horodecki, Michal +2 more
core +3 more sources
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper.
Dang The Hung +4 more
doaj +1 more source
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed.
Ping Xie +5 more
doaj +1 more source
A method of enciphering quantum states [PDF]
In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties.
Bennett C H +12 more
core +5 more sources
In recent years, physical layer security has been considered as an effective method to enhance the information security beside the cryptographic techniques that are used in upper layers. In this paper, we provide the security analysis for a two-way relay
Duy-Hung Ha +5 more
doaj +1 more source
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak +4 more
doaj +1 more source
Q-Learning-Based Power Allocation for Secure Wireless Communication in UAV-Aided Relay Network
Unmanned aerial vehicle (UAV)-aided wireless relay networks are at risk of eavesdropping activities due to their open nature. In this paper, we study the security of a UAV-aided selective relaying wireless network in which $N$ UAVs are employed as ...
Sidqy I. Alnagar +2 more
doaj +1 more source
A PHY Layer Security Analysis of a Hybrid High Throughput Satellite With an Optical Feeder Link
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40
Elmehdi Illi +3 more
doaj +1 more source
Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach
The highly dynamic nature of cognitive radio (CR) systems and their stringent latency requirements pose a significant challenge in the realization of efficient intelligent transport systems (ITS).
Esraa M. Ghourab +5 more
doaj +1 more source

