Results 21 to 30 of about 133,625 (274)
Secrecy capacity over correlated ergodic fading channel [PDF]
We investigate the secrecy capacity of an ergodic fading wiretap channel in which the main channel is correlated with the eavesdropper channel. In this study, the full Channel State Information (CSI) is assumed, and thus the transmitter knows the channel gains of the legitimate receiver and the eavesdropper.
Jeon, Hyoungsuk +4 more
openaire +2 more sources
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on
Guangfen Xie, Bin Dai
doaj +1 more source
E - Capacity - Equivocation Region of Wiretap Channel [PDF]
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj +3 more sources
On Secrecy Capacity Scaling in Wireless Networks [PDF]
This work studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities $ $ and $ _e$, respectively.
Koyluoglu, O. Ozan +2 more
openaire +2 more sources
Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi +5 more
doaj +1 more source
The secrecy capacity of practical quantum cryptography [PDF]
Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of complete ...
Gilbert, G., Hamrick, M.
openaire +2 more sources
Secure Communications in SWIPT-Enabled Two-Way Relay Networks
This paper investigates the secrecy performance of a wireless-powered two-way relay network in the presence of an eavesdropper. Based on adaptive time allocation (TA) and power splitting (PS), a novel secure relaying protocol is proposed. For the purpose
Yang Zhang, Xiangmo Zhao, Ying Xie
doaj +1 more source
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma +4 more
doaj +1 more source
Cooperative relaying is an effective technology to improve the capacity of physical-layer security, in which the relay helps forward the received signal to the destination. In this paper, a cooperative compressive sensing and amplify-and-forward (CCS-AF)
Jialun Li +5 more
doaj +1 more source
Some New Results on the GaussianWiretap Feedback Channel
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj +1 more source

