Results 31 to 40 of about 6,150 (302)
Some New Results on the GaussianWiretap Feedback Channel
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj +1 more source
Robust Biometric Authentication from an Information Theoretic Perspective
Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes.
Andrea Grigorescu +2 more
doaj +1 more source
The Secrecy Capacity of the MIMO Wiretap Channel [PDF]
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that ...
Oggier, Frédérique, Hassibi, Babak
openaire +5 more sources
Some New Results on the Multiple-AccessWiretap Channel
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj +1 more source
In this paper, we consider the physical layer security problem of the wireless communication system. For the multiple-input, multiple-output (MIMO) wireless communication system, secrecy capacity optimization artificial noise (SCO−AN) is introduced and ...
Yebo Gu, Bowen Huang, Zhilu Wu
doaj +1 more source
Secrecy Capacity of Space Keying with Two Antennas [PDF]
Spatial modulation (SM) and space shift keying (SSK) use only one out of several transmit antennas at a time to transmit data via an antenna index. In such a system, the information is encoded by exploiting channel randomness i.e. the fact that channels between different transmit and receive antennas are random.
Sinanovic, S. +3 more
openaire +2 more sources
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI
doaj +2 more sources
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels [PDF]
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers, where weak receivers, respectively strong receivers, have same erasure probabilities and cache sizes. The lower bounds are achieved by schemes that meticulously combine joint cache-
Sarah Kamel +3 more
openaire +2 more sources
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu +4 more
doaj +1 more source

