Results 1 to 10 of about 6,150 (302)
Secrecy capacity of LiFi systems [PDF]
Radio frequency (RF) signals propagate through most materials that we are surrounded by while light is blocked by many of these materials. This feature makes wireless networks based on light (which are also referred to as LiFi networks) inherently more secure.
Abumarshoud, Hanaa +3 more
openaire +4 more sources
Secure Estimation and Zero-Error Secrecy Capacity [PDF]
We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain ...
Moritz Wiese +5 more
+7 more sources
Evaluating Secrecy Capacity for In-Body Wireless Channels [PDF]
The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper.
Muhammad Faheem Awan +6 more
doaj +2 more sources
RFID Ownership Transfer with Positive Secrecy Capacity Channels. [PDF]
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved.
Munilla J +4 more
europepmc +6 more sources
Secrecy Capacity Region of Fading Broadcast Channels [PDF]
Proc.
Liang, Yingbin +2 more
openaire +3 more sources
On the Secrecy Capacity of Fading Channels [PDF]
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full Channel
Gopala, Praveen Kumar +2 more
openaire +5 more sources
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback. [PDF]
Yuan H, Xie G, Dai B.
europepmc +3 more sources
Realistic Secrecy Performance Analysis for LiFi Systems
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud +3 more
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R. +2 more
openaire +2 more sources
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source

