Results 1 to 10 of about 133,625 (274)
Vehicle Communication using Secrecy Capacity [PDF]
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang +17 more
core +2 more sources
Secrecy Capacity Region of Fading Broadcast Channels [PDF]
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin +2 more
core +3 more sources
RFID Ownership Transfer with Positive Secrecy Capacity Channels. [PDF]
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved.
Munilla J +4 more
europepmc +6 more sources
Evaluating Secrecy Capacity for In-Body Wireless Channels [PDF]
The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper.
Muhammad Faheem Awan +6 more
doaj +2 more sources
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels.
Ersen Ekrem, Sennur Ulukus
doaj +10 more sources
On the Secrecy Capacity of Fading Channels [PDF]
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El +2 more
core +5 more sources
Realistic Secrecy Performance Analysis for LiFi Systems
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud +3 more
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R. +2 more
openaire +2 more sources
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals.
Maymoona Hayajneh, Thomas Aaron Gulliver
doaj +1 more source

