Results 241 to 250 of about 133,625 (274)
Some of the next articles are maybe not open access.
Secrecy Capacity of Diffusion-Based Molecular Communication Systems
2020Molecular communication (MC) is a new communication paradigm where, opposite to radio or optical communication, the information flow is based on the molecules exchange and chemical interactions. Thanks to the high biological compatibility and nano-scale feasibility, MC is a promising communication technology for health applications, from disease ...
Lorenzo Mucchi +4 more
openaire +2 more sources
Secrecy capacity of the Noise-Loop secure modulation
2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to be deployed worldwide. Traditionally, security is viewed as an independent feature addressed above the physical layer and all widely used cryptographic protocols are designed and implemented assuming that the ...
MUCCHI, LORENZO +3 more
openaire +2 more sources
Non-Uniform Secrecy Capacity in Terahertz Networks
2020 13th UK-Europe-China Workshop on Millimetre-Waves and Terahertz Technologies (UCMMT), 2020We present the first security study of THz networks which employ leaky wave antennas (LWAs). We show that the LWA's angle-frequency coupling leads to non-uniform secrecy capacity across sub-channels, very different from conventional eavesdropping threat models. This offers both challenges and opportunities for designing systems with enhanced security.
Chia-Yi Yeh +4 more
openaire +1 more source
Secrecy Capacity of Independent Parallel Channels
2009Ensuring the confidentiality of communications is fundamental to securing any network. This requirement becomes particularly important for wireless systems, where eavesdropping is facilitated by the broadcast nature of the wireless medium. Rather than physically guard the communication medium to provide confidentiality, the traditional approach is to ...
Zang Li, Roy Yates, Wade Trappe
openaire +1 more source
Linear Secrecy Capacity Scaling in Dense Networks
2015 IEEE Globecom Workshops (GC Wkshps), 2015We propose a new hierarchical cooperation technique using jamming in dense networks to achieve linear secrecy capacity scaling. To show the effect of the jamming signal in the proposed scheme, we derive the tolerable intensities of eavesdroppers to achieve the linear secrecy capacity scaling for hierarchical cooperation schemes with and without jamming,
Myung Gil Kang +3 more
openaire +1 more source
Secrecy capacity of correlated rayleigh fading channels
2012 18th Asia-Pacific Conference on Communications (APCC), 2012We consider the secure transmission of information over Rayleigh fading wiretap channel when the main and eavesdropper channels are correlated there. Assuming that before transmission the transmitter knows the full channel state information (CSI) of both the main and eavesdropper channels, we analyze the average secrecy capacity with limited signal-to ...
null Jinxiao Zhu +3 more
openaire +1 more source
Secrecy Capacity Region of Parallel Broadcast Channels
2007 Information Theory and Applications Workshop, 2007The parallel broadcast channel with confidential messages (BCC) is investigated, where a source node transmits to two receivers (receivers 1 and 2) over multiple independent subchannels. The source node has common information for both receivers, and has confidential information intended only for receiver 1. The confidential information needs to be kept
Yingbin Liang +2 more
openaire +1 more source
Secrecy capacity of minimum storage regenerating codes
2017 IEEE International Symposium on Information Theory (ISIT), 2017This paper revisits the problem of designing secure minimum storage regenerating (MSR) codes for distributed storage systems (DSS). A secure MSR code ensures that a DSS does not reveal the stored information to a passive eavesdropper. The eavesdropper is assumed to have access to the content stored on £i number of storage nodes in the system and the ...
openaire +1 more source
On the Secrecy Design of STAR-RIS Assisted Uplink NOMA Networks
IEEE Transactions on Wireless Communications, 2022Zheng Zhang, Jian Chen, Yuanawei Liu
exaly
The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet
IEEE Communications Surveys and Tutorials, 2022Yuan Cao, Yong-li Zhao, Qin Wang
exaly

