Results 1 to 10 of about 134,321 (273)
Vehicle Communication Using Secrecy Capacity [PDF]
17 Pages, 12 ...
Ahn, Na-Young +2 more
openaire +3 more sources
RFID Ownership Transfer with Positive Secrecy Capacity Channels. [PDF]
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved.
Munilla J +4 more
europepmc +6 more sources
Secrecy Capacity Region of Fading Broadcast Channels [PDF]
Proc.
Liang, Yingbin +2 more
openaire +4 more sources
Evaluating Secrecy Capacity for In-Body Wireless Channels [PDF]
The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper.
Muhammad Faheem Awan +6 more
doaj +2 more sources
On the Secrecy Capacity of Fading Channels [PDF]
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full Channel
Gopala, Praveen Kumar +2 more
openaire +6 more sources
Realistic Secrecy Performance Analysis for LiFi Systems
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud +3 more
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R. +2 more
openaire +2 more sources
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals.
Maymoona Hayajneh, Thomas Aaron Gulliver
doaj +1 more source
Secrecy capacity of LiFi systems [PDF]
Radio frequency (RF) signals propagate through most materials that we are surrounded by while light is blocked by many of these materials. This feature makes wireless networks based on light (which are also referred to as LiFi networks) inherently more secure.
Abumarshoud, Hanaa +3 more
openaire +2 more sources

