Results 11 to 20 of about 306,585 (324)

On the Secrecy Capacity of Fading Channels [PDF]

open access: yes2007 IEEE International Symposium on Information Theory, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Praveen Kumar Gopala   +2 more
semanticscholar   +5 more sources

Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications [PDF]

open access: yesIEEE Communications Letters, 2019
We investigate transmission optimization for intelligent reflecting surface (IRS) assisted multi-antenna systems from the physical-layer security perspective.
Hong Shen   +4 more
semanticscholar   +1 more source

Broken Latin, Secret Europe: Benjamin, Celan, Derrida

open access: yesEidos. A Journal for Philosophy of Culture, 2021
The author begins by analyzing Walter Benjamin’s quarrel with George Kreis and the respective visions of culture advocated by both sides of the debate.
Adam Lipszyc
doaj   +1 more source

Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not? [PDF]

open access: yesIEEE Wireless Communications Letters, 2019
In this letter, we investigate whether the use of artificial noise (AN) is helpful to enhance the secrecy rate of an intelligent reflecting surface (IRS) assisted wireless communication system.
Xinrong Guan, Qingqing Wu, Rui Zhang
semanticscholar   +1 more source

Optimized Artificial Bee Colony Algorithm with Markov Chain

open access: yesJisuanji kexue yu tansuo, 2020
The shortcomings of the artificial bee colony algorithm (ABC) and its improved algorithm are analyzed. This paper proposes the improved Markov ABC (IMABC) dividing the ABC algorithm into two stages by verifying the Markov property of the artificial bee ...
GUO Jia, MA Chaobin, ZHANG Shaobo, MIAO Mengmeng
doaj   +1 more source

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

open access: yesIEEE Internet of Things Journal, 2023
This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay ${R}$ .
Ranran Sun   +4 more
semanticscholar   +1 more source

Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels

open access: yesIEEE Transactions on Vehicular Technology, 2017
Lisheng Fan   +4 more
semanticscholar   +3 more sources

Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface

open access: yesIEEE Transactions on Communications, 2021
This paper aims to investigate the benefit of using intelligent reflecting surface (IRS) in multi-user multiple-input single-output (MU-MISO) systems, in the presence of eavesdroppers.
Hehao Niu   +5 more
semanticscholar   +1 more source

Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System

open access: yesIEEE Transactions on Information Forensics and Security, 2021
This paper investigates the impact of intelligent reflecting surface (IRS) enabled wireless secure transmission. Specifically, an IRS is deployed to assist multiple-input multiple-output (MIMO) secure system to enhance the secrecy performance, and ...
Zheng Chu   +7 more
semanticscholar   +1 more source

The Crimes of the Powerful: Between Force and Consensus

open access: yesSocial Sciences, 2021
Power entails the ability to act and overcome the obstacles erected by those who are subject to it. It also entails the capacity to make one’s crimes acceptable, while formulating criminal imputations against others.
Vincenzo Ruggiero
doaj   +1 more source

Home - About - Disclaimer - Privacy