Results 41 to 50 of about 133,625 (274)

Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code

open access: yesEntropy, 2023
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu   +4 more
doaj   +1 more source

Physical Layer Security: Coalitional Games for Distributed Cooperation

open access: yes, 2009
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers.
Basar, Tamer   +4 more
core   +2 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Secrecy transmission capacity of decentralized wireless networks [PDF]

open access: yes2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2011
Secure communication over large-scale decentralized wireless networks is an extremely challenging task due to the cost and difficulty in establishing secret keys among all the nodes in a distributed manner. For this reason, the notion of physical layer security has recently drawn significant attention, which may assist with key exchange and provide an ...
Xiangyun Zhou   +3 more
openaire   +1 more source

Capacity Bounds for Identification With Effective Secrecy

open access: yes2023 IEEE International Symposium on Information Theory (ISIT), 2023
An upper bound to the identification capacity of discrete memoryless wiretap channels is derived under the requirement of semantic effective secrecy, combining semantic secrecy and stealth constraints. A previously established lower bound is improved by applying it to a prefix channel, formed by concatenating an auxiliary channel and the actual channel.
Rosenberger, Johannes   +5 more
openaire   +2 more sources

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and Super-Activation

open access: yes, 2018
We determine the secrecy capacities of AVQCs (arbitrarily varying quantum channels). Both secrecy capacity with average error probability and with maximal error probability are derived. Both derivations are based on one common code construction. The code
Boche, Holger   +3 more
core   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints

open access: yesIEEE Access, 2020
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach   +3 more
doaj   +1 more source

Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas

open access: yes, 2017
A Gaussian multiple-input multiple-output wiretap channel in which the eavesdropper and legitimate receiver are equipped with arbitrary numbers of antennas and the transmitter has two antennas is studied in this paper.
Poor, H. Vincent   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy