Results 41 to 50 of about 306,585 (324)
Realistic Secrecy Performance Analysis for LiFi Systems
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy outage
Hanaa Abumarshoud +3 more
semanticscholar +1 more source
Vehicle Communication using Secrecy Capacity
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang +17 more
core +1 more source
Uplink Secrecy Performance of RIS-Based RF/FSO Three-Dimension Heterogeneous Networks
In this paper, a novel reconfigurable intelligent surface (RIS)-assisted HAP-UAV secure multi-user mixed radio frequency (RF)/free space optical (FSO) system is proposed.
Dawei Wang +5 more
semanticscholar +1 more source
Multipartite Classical and Quantum Secrecy Monotones [PDF]
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl +22 more
core +2 more sources
Joint Beamforming Design and Power Minimization for Friendly Jamming Relaying Hybrid RF/VLC Systems
In this paper, we study physical layer security (PLS) aspects of a hybrid radio frequency (RF)/visible light communication (VLC) system with multiple decode-and-forward relaying nodes equipped with friendly jamming capabilities.
Jaber Al-Khori +3 more
doaj +1 more source
Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W. +3 more
core +2 more sources
Maximal Correlation Secrecy [PDF]
This paper shows that the Hirschfeld-Gebelein-R nyi maximal correlation between the message and the ciphertext provides good secrecy guarantees for cryptosystems that use short keys. We first establish a bound on the eavesdropper's advantage in guessing functions of the message in terms of maximal correlation and the R nyi entropy of the message ...
Cheuk Ting Li, Abbas El Gamal
openaire +2 more sources
Secrecy Capacity Region of Fading Broadcast Channels
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin +2 more
core +2 more sources
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B. +4 more
core +1 more source
Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization
Recent work characterizing the optimal performance of secrecy systems has made use of a distortion-like metric for partial secrecy as a replacement for the more traditional metric of equivocation.
Cuff, Paul
core +1 more source

