Results 271 to 280 of about 6,150 (302)
Some of the next articles are maybe not open access.

Non-Uniform Secrecy Capacity in Terahertz Networks

2020 13th UK-Europe-China Workshop on Millimetre-Waves and Terahertz Technologies (UCMMT), 2020
We present the first security study of THz networks which employ leaky wave antennas (LWAs). We show that the LWA's angle-frequency coupling leads to non-uniform secrecy capacity across sub-channels, very different from conventional eavesdropping threat models. This offers both challenges and opportunities for designing systems with enhanced security.
Chia-Yi Yeh   +4 more
openaire   +1 more source

Secrecy Capacity of Independent Parallel Channels

2009
Ensuring the confidentiality of communications is fundamental to securing any network. This requirement becomes particularly important for wireless systems, where eavesdropping is facilitated by the broadcast nature of the wireless medium. Rather than physically guard the communication medium to provide confidentiality, the traditional approach is to ...
Zang Li, Roy Yates, Wade Trappe
openaire   +1 more source

Linear Secrecy Capacity Scaling in Dense Networks

2015 IEEE Globecom Workshops (GC Wkshps), 2015
We propose a new hierarchical cooperation technique using jamming in dense networks to achieve linear secrecy capacity scaling. To show the effect of the jamming signal in the proposed scheme, we derive the tolerable intensities of eavesdroppers to achieve the linear secrecy capacity scaling for hierarchical cooperation schemes with and without jamming,
Myung Gil Kang   +3 more
openaire   +1 more source

Secrecy capacity of correlated rayleigh fading channels

2012 18th Asia-Pacific Conference on Communications (APCC), 2012
We consider the secure transmission of information over Rayleigh fading wiretap channel when the main and eavesdropper channels are correlated there. Assuming that before transmission the transmitter knows the full channel state information (CSI) of both the main and eavesdropper channels, we analyze the average secrecy capacity with limited signal-to ...
null Jinxiao Zhu   +3 more
openaire   +1 more source

Secrecy Capacity Region of Parallel Broadcast Channels

2007 Information Theory and Applications Workshop, 2007
The parallel broadcast channel with confidential messages (BCC) is investigated, where a source node transmits to two receivers (receivers 1 and 2) over multiple independent subchannels. The source node has common information for both receivers, and has confidential information intended only for receiver 1. The confidential information needs to be kept
Yingbin Liang   +2 more
openaire   +1 more source

Secrecy capacity of minimum storage regenerating codes

2017 IEEE International Symposium on Information Theory (ISIT), 2017
This paper revisits the problem of designing secure minimum storage regenerating (MSR) codes for distributed storage systems (DSS). A secure MSR code ensures that a DSS does not reveal the stored information to a passive eavesdropper. The eavesdropper is assumed to have access to the content stored on £i number of storage nodes in the system and the ...
openaire   +1 more source

Secrecy Performance for RIS-Based Integrated Satellite Vehicle Networks With a UAV Relay and MRC Eavesdropping

IEEE Transactions on Intelligent Vehicles, 2023
Feng Zhou, Xingwang Li, Mamoun Alazab
exaly  

AF Relaying Secrecy Performance Prediction for 6G Mobile Communication Networks in Industry 5.0

IEEE Transactions on Industrial Informatics, 2022
Lingwei Xu, Ye Tao, Xu Yu
exaly  

Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems

IEEE Transactions on Vehicular Technology, 2020
Liang Yang, Yang Jinxia, Wenwu Xie
exaly  

Enhancing Secrecy Performance for STAR-RIS NOMA Networks

IEEE Transactions on Vehicular Technology, 2023
Xingwang Li, Yike Zheng, Ming Zeng
exaly  

Home - About - Disclaimer - Privacy