Results 141 to 150 of about 451,706 (170)
Some of the next articles are maybe not open access.
Physical Layer Security Assisted 5G Network Security
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017After 4G network becomes a global commercial success, the researchers are now looking at the future 5G technologies, both in standardization bodies and in research projects. Researchers find that the security architecture used in 4G can not satisfy the needs of 5G.
Fei Pan +4 more
openaire +1 more source
2019
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
This chapter is devoted to the physical-layer security. The chapter starts with discussion on security issues, followed by the introduction of information-theoretic security, and comparison against the computational security. In the same section, various information-theoretic security measures are introduced, including strong secrecy and weak secrecy ...
openaire +1 more source
A Secure and Power-Efficient Constellations for Physical Layer Security
2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019With the development of wireless networks, the security of wireless systems is becoming more and more important. In this paper, a novel double layers constellations is proposed to protect the polarization modulation information from being acquired by the eavesdropper.
Weiqing Huang +3 more
openaire +1 more source
Security embedding on UWB-IR physical layer
2012 IEEE Global Communications Conference (GLOBECOM), 2012Abstract--The main goal of this work is to incorporate security in an existing ultra wideband (UWB) network. We present an embedding method where a tag is added at the physical layer and superimposed to the UWB-impulse radio signal. The tag should be added in a transparent way so that guaranteeing compatibility with existing receivers ignoring the ...
Gorce, Jean-Marie +2 more
openaire +2 more sources
2022
As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security issues associated with a wireless transmission medium. Unlike traditional solutions, which usually handle security at the application layer, the primary concern of this thesis is to ...
openaire +1 more source
As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security issues associated with a wireless transmission medium. Unlike traditional solutions, which usually handle security at the application layer, the primary concern of this thesis is to ...
openaire +1 more source
LDPC for Physical Layer Security
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009Demijan Klinc +4 more
openaire +1 more source
Physical Layer Security for THz Communication
2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 2023Shubha Sharma, A. S. Madhukumar
openaire +1 more source
Relaying and physical layer security
2016In this chapter, we investigate the problem of physical-layer security in wireless networks with cooperative relays. In Sections 11.2 and 11.3, we study the notion of deaf cooperation to reinforce security of transmission in wireless relay networks.
Raef Bassily, Sennur Ulukus
openaire +1 more source
Multilevel Coding for Physical-Layer Security
IEEE Transactions on Communications, 2022Johannes Pfeiffer, Robert F. H. Fischer
openaire +1 more source

