Results 101 to 110 of about 4,330 (158)

Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]

open access: yesSci Rep
Mohammed ZK   +7 more
europepmc   +1 more source

Rescue of the traditional song culture of a critically endangered songbird. [PDF]

open access: yesSci Rep
Appleby D   +6 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Safeguarding RFID Wireless Communication Against Proactive Eavesdropping

IEEE Internet of Things Journal, 2020
Passive radio-frequency identification (RFID) communication raises new transmission secrecy protection challenges, since passive tags stored information lack effective information protection mechanisms. Due to constraints of passive tags, such as limited computation and storage capabilities, security solutions based on the physical-layer security (PLS)
Bing-Qing Zhao, Hui-Ming Wang, Peng Liu
openaire   +1 more source

Safeguarding Backscatter RFID Communication against Proactive Eavesdropping

ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020
Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it is able to both enhance the information wiretap and interfere with the information detection at the RFID reader simultaneously by broadcasting its own continuous wave (CW) signal.
Bing-Qing Zhao   +2 more
openaire   +1 more source

Cooperative Proactive Eavesdropping Based on Deep Reinforcement Learning

IEEE Wireless Communications Letters, 2021
There is illegitimate transmission of information between suspicious users, whereas single legitimate monitor (LM) has finite capacity to satisfy eavesdropping. This letter studies a cooperative proactive eavesdropping(CPE) scheme, where two LMs eavesdrop on multiple suspicious links simultaneously with a cooperative jamming method under finite power ...
Yaxin Yang   +4 more
openaire   +1 more source

Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

IEEE Transactions on Wireless Communications, 2019
In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor
Jihwan Moon   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy