Results 241 to 250 of about 2,320 (256)
Some of the next articles are maybe not open access.
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper
IEEE Transactions on Vehicular Technology, 2014Kanapathippillai Cumanan +2 more
exaly
Perfect Authentication Codes Without Secrecy
Proceedings. 1991 IEEE International Symposium on Information Theory, 2005openaire +1 more source
Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers
IEEE Transactions on Vehicular Technology, 2018Lin Hu, Hong Wen, Fei Pan
exaly
Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers
IEEE Transactions on Wireless Communications, 2016Zheng Chu, Hong Xing, Martin Johnston
exaly
Password-based authentication and key distribution protocols with perfect forward secrecy
Journal of Computer and System Sciences, 2006HerTyan Yeh
exaly
Perfect-Mail: A Secure E-mail Protocol with Perfect Forward Secrecy
British Journal of Mathematics & Computer Science, 2016Baoyuan Kang, Danhui Xu
openaire +1 more source
Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference
IEEE Transactions on Information Forensics and Security, 2016David A Karpuk, Arsenia Chorti
exaly

