Results 41 to 50 of about 306,585 (324)

Realistic Secrecy Performance Analysis for LiFi Systems

open access: yesIEEE Access, 2021
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy outage
Hanaa Abumarshoud   +3 more
semanticscholar   +1 more source

Vehicle Communication using Secrecy Capacity

open access: yes, 2018
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang   +17 more
core   +1 more source

Uplink Secrecy Performance of RIS-Based RF/FSO Three-Dimension Heterogeneous Networks

open access: yesIEEE Transactions on Wireless Communications
In this paper, a novel reconfigurable intelligent surface (RIS)-assisted HAP-UAV secure multi-user mixed radio frequency (RF)/free space optical (FSO) system is proposed.
Dawei Wang   +5 more
semanticscholar   +1 more source

Multipartite Classical and Quantum Secrecy Monotones [PDF]

open access: yes, 2002
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl   +22 more
core   +2 more sources

Joint Beamforming Design and Power Minimization for Friendly Jamming Relaying Hybrid RF/VLC Systems

open access: yesIEEE Photonics Journal, 2019
In this paper, we study physical layer security (PLS) aspects of a hybrid radio frequency (RF)/visible light communication (VLC) system with multiple decode-and-forward relaying nodes equipped with friendly jamming capabilities.
Jaber Al-Khori   +3 more
doaj   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Maximal Correlation Secrecy [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
This paper shows that the Hirschfeld-Gebelein-R nyi maximal correlation between the message and the ciphertext provides good secrecy guarantees for cryptosystems that use short keys. We first establish a bound on the eavesdropper's advantage in guessing functions of the message in terms of maximal correlation and the R nyi entropy of the message ...
Cheuk Ting Li, Abbas El Gamal
openaire   +2 more sources

Secrecy Capacity Region of Fading Broadcast Channels

open access: yes, 2007
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin   +2 more
core   +2 more sources

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization

open access: yes, 2013
Recent work characterizing the optimal performance of secrecy systems has made use of a distortion-like metric for partial secrecy as a replacement for the more traditional metric of equivocation.
Cuff, Paul
core   +1 more source

Home - About - Disclaimer - Privacy