Results 271 to 280 of about 6,150 (302)
Some of the next articles are maybe not open access.
Non-Uniform Secrecy Capacity in Terahertz Networks
2020 13th UK-Europe-China Workshop on Millimetre-Waves and Terahertz Technologies (UCMMT), 2020We present the first security study of THz networks which employ leaky wave antennas (LWAs). We show that the LWA's angle-frequency coupling leads to non-uniform secrecy capacity across sub-channels, very different from conventional eavesdropping threat models. This offers both challenges and opportunities for designing systems with enhanced security.
Chia-Yi Yeh +4 more
openaire +1 more source
Secrecy Capacity of Independent Parallel Channels
2009Ensuring the confidentiality of communications is fundamental to securing any network. This requirement becomes particularly important for wireless systems, where eavesdropping is facilitated by the broadcast nature of the wireless medium. Rather than physically guard the communication medium to provide confidentiality, the traditional approach is to ...
Zang Li, Roy Yates, Wade Trappe
openaire +1 more source
Linear Secrecy Capacity Scaling in Dense Networks
2015 IEEE Globecom Workshops (GC Wkshps), 2015We propose a new hierarchical cooperation technique using jamming in dense networks to achieve linear secrecy capacity scaling. To show the effect of the jamming signal in the proposed scheme, we derive the tolerable intensities of eavesdroppers to achieve the linear secrecy capacity scaling for hierarchical cooperation schemes with and without jamming,
Myung Gil Kang +3 more
openaire +1 more source
Secrecy capacity of correlated rayleigh fading channels
2012 18th Asia-Pacific Conference on Communications (APCC), 2012We consider the secure transmission of information over Rayleigh fading wiretap channel when the main and eavesdropper channels are correlated there. Assuming that before transmission the transmitter knows the full channel state information (CSI) of both the main and eavesdropper channels, we analyze the average secrecy capacity with limited signal-to ...
null Jinxiao Zhu +3 more
openaire +1 more source
Secrecy Capacity Region of Parallel Broadcast Channels
2007 Information Theory and Applications Workshop, 2007The parallel broadcast channel with confidential messages (BCC) is investigated, where a source node transmits to two receivers (receivers 1 and 2) over multiple independent subchannels. The source node has common information for both receivers, and has confidential information intended only for receiver 1. The confidential information needs to be kept
Yingbin Liang +2 more
openaire +1 more source
Secrecy capacity of minimum storage regenerating codes
2017 IEEE International Symposium on Information Theory (ISIT), 2017This paper revisits the problem of designing secure minimum storage regenerating (MSR) codes for distributed storage systems (DSS). A secure MSR code ensures that a DSS does not reveal the stored information to a passive eavesdropper. The eavesdropper is assumed to have access to the content stored on £i number of storage nodes in the system and the ...
openaire +1 more source
AF Relaying Secrecy Performance Prediction for 6G Mobile Communication Networks in Industry 5.0
IEEE Transactions on Industrial Informatics, 2022Lingwei Xu, Ye Tao, Xu Yu
exaly
Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems
IEEE Transactions on Vehicular Technology, 2020Liang Yang, Yang Jinxia, Wenwu Xie
exaly
Enhancing Secrecy Performance for STAR-RIS NOMA Networks
IEEE Transactions on Vehicular Technology, 2023Xingwang Li, Yike Zheng, Ming Zeng
exaly

