Results 251 to 260 of about 6,150 (302)
Time-Varying Cypher Assignment Based on Secrecy Capacity
Cheng‐Ying Yang +4 more
openalex +2 more sources
Qualitative evaluation of the Mentor Mothers' programme in Nigerian military hospitals: the path to meeting PMTCT targets. [PDF]
Ibu JM, Ibu TM, Ndiok AE, Igbudu KD.
europepmc +1 more source
Health status and prognosis of COPD patients in relation to the FEV<sub>1</sub>/FVC ratio. [PDF]
Wang J +8 more
europepmc +1 more source
An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel
Liu Ruoheng +3 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023
Having seized state power, the Bolsheviks pursued twin goals: to gain exclusive control of the state and the expansion of its capacities. The chapter reviews the various meanings and dimensions of “state capacity” and illustrates unique aspects of the capacity of communist states during the Cold War. Secrecy contributed to both twin goals, but beyond a
openaire +2 more sources
Having seized state power, the Bolsheviks pursued twin goals: to gain exclusive control of the state and the expansion of its capacities. The chapter reviews the various meanings and dimensions of “state capacity” and illustrates unique aspects of the capacity of communist states during the Cold War. Secrecy contributed to both twin goals, but beyond a
openaire +2 more sources
MIMOME channel secrecy capacity
2008 11th International Conference on Computer and Information Technology, 2008Although conventional cryptographic security mechanisms are essential to the overall problem of security, the openness of wireless medium poses both threats and opportunities for securing transmission. Information theoretic security is attracting researchers for its robust nature.
Mohammad Rakibul Islam +2 more
openaire +1 more source
On Multiterminal Secrecy Capacities
2007 IEEE International Symposium on Information Theory, 2007Shannon-theoretic secret key generation by several parties is considered for source models in which the distinct components of a multiple source observed separately by multiple terminals, and for channel models in which a secure noisy channel with one input terminal and multiple output terminals, and, additionally in both cases, a public noiseless ...
Imre Csiszar, Prakash Narayan
openaire +1 more source
Secrecy capacities for multiterminal channel models
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2005Shannon-theoretic secret key generation by several parties is considered for models in which a secure noisy channel with one input terminal and multiple output terminals and a public noiseless channel of unlimited capacity are available for accomplishing this goal.
Imre Csiszar, Prakash Narayan
openaire +1 more source
Secrecy Capacities for Multiple Terminals
IEEE Transactions on Information Theory, 2004We derive single-letter characterizations of (strong) secrecy capacities for models with an arbitrary number of terminals, each of which observes a distinct component of a discrete memoryless multiple source, with unrestricted and interactive public communication permitted between the terminals.
I. Csiszar, P. Narayan
openaire +1 more source
Secrecy Capacity per Unit Cost
IEEE Journal on Selected Areas in Communications, 2013The concept of channel capacity per unit cost was introduced by Verdu in 1990 to study the limits of cost-efficient wide-band communication. It was shown that orthogonal signaling can achieve the channel capacity per unit cost of memoryless stationary channels with a zero-cost input letter.
Mustafa El-Halabi +2 more
openaire +1 more source

