Results 1 to 10 of about 133,625 (274)

Vehicle Communication using Secrecy Capacity [PDF]

open access: yes, 2018
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang   +17 more
core   +2 more sources

Secrecy Capacity Region of Fading Broadcast Channels [PDF]

open access: yes2007 IEEE International Symposium on Information Theory, 2007
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin   +2 more
core   +3 more sources

RFID Ownership Transfer with Positive Secrecy Capacity Channels. [PDF]

open access: yesSensors (Basel), 2016
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved.
Munilla J   +4 more
europepmc   +6 more sources

Evaluating Secrecy Capacity for In-Body Wireless Channels [PDF]

open access: yesEntropy, 2019
The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper.
Muhammad Faheem Awan   +6 more
doaj   +2 more sources

Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels.
Ersen Ekrem, Sennur Ulukus
doaj   +10 more sources

On the Secrecy Capacity of Fading Channels [PDF]

open access: yes2007 IEEE International Symposium on Information Theory, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +5 more sources

Realistic Secrecy Performance Analysis for LiFi Systems

open access: yesIEEE Access, 2021
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud   +3 more
doaj   +1 more source

On secrecy above secrecy capacity [PDF]

open access: yes2012 IEEE International Conference on Communication Systems (ICCS), 2012
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R.   +2 more
openaire   +2 more sources

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer

open access: yesEntropy, 2023
In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals.
Maymoona Hayajneh, Thomas Aaron Gulliver
doaj   +1 more source

Home - About - Disclaimer - Privacy