Results 31 to 40 of about 6,150 (302)

Some New Results on the GaussianWiretap Feedback Channel

open access: yesEntropy, 2019
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj   +1 more source

Robust Biometric Authentication from an Information Theoretic Perspective

open access: yesEntropy, 2017
Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes.
Andrea Grigorescu   +2 more
doaj   +1 more source

The Secrecy Capacity of the MIMO Wiretap Channel [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that ...
Oggier, Frédérique, Hassibi, Babak
openaire   +5 more sources

Some New Results on the Multiple-AccessWiretap Channel

open access: yesEntropy, 2014
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj   +1 more source

Power Allocation for Secrecy-Capacity-Optimization-Artificial-Noise Secure MIMO Precoding Systems under Perfect and Imperfect Channel State Information

open access: yesApplied Sciences, 2021
In this paper, we consider the physical layer security problem of the wireless communication system. For the multiple-input, multiple-output (MIMO) wireless communication system, secrecy capacity optimization artificial noise (SCO−AN) is introduced and ...
Yebo Gu, Bowen Huang, Zhilu Wu
doaj   +1 more source

Secrecy Capacity of Space Keying with Two Antennas [PDF]

open access: yes2012 IEEE Vehicular Technology Conference (VTC Fall), 2012
Spatial modulation (SM) and space shift keying (SSK) use only one out of several transmit antennas at a time to transmit data via an antenna index. In such a system, the information is encoded by exploiting channel randomness i.e. the fact that channels between different transmit and receive antennas are random.
Sinanovic, S.   +3 more
openaire   +2 more sources

Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case

open access: yesTongxin xuebao, 2020
A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI
doaj   +2 more sources

Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels [PDF]

open access: yesIEEE Transactions on Information Theory, 2019
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers, where weak receivers, respectively strong receivers, have same erasure probabilities and cache sizes. The lower bounds are achieved by schemes that meticulously combine joint cache-
Sarah Kamel   +3 more
openaire   +2 more sources

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code

open access: yesEntropy, 2023
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy