Results 241 to 250 of about 2,320 (256)
Some of the next articles are maybe not open access.

Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper

IEEE Transactions on Vehicular Technology, 2014
Kanapathippillai Cumanan   +2 more
exaly  

Perfect Authentication Codes Without Secrecy

Proceedings. 1991 IEEE International Symposium on Information Theory, 2005
openaire   +1 more source

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers

IEEE Transactions on Vehicular Technology, 2018
Lin Hu, Hong Wen, Fei Pan
exaly  

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers

IEEE Transactions on Wireless Communications, 2016
Zheng Chu, Hong Xing, Martin Johnston
exaly  

Perfect-Mail: A Secure E-mail Protocol with Perfect Forward Secrecy

British Journal of Mathematics & Computer Science, 2016
Baoyuan Kang, Danhui Xu
openaire   +1 more source

Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference

IEEE Transactions on Information Forensics and Security, 2016
David A Karpuk, Arsenia Chorti
exaly  

Home - About - Disclaimer - Privacy