Results 51 to 60 of about 133,625 (274)
Secure Estimation and Zero-Error Secrecy Capacity [PDF]
We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain ...
Moritz Wiese +5 more
openaire +2 more sources
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security ...
Long Kong +5 more
doaj +1 more source
Secrecy capacity region of Gaussian broadcast channel [PDF]
In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel.
Ghadamali Bagherikaram +2 more
openaire +1 more source
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states.
Shlomo Shamai (Shitz) +3 more
doaj +2 more sources
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman +5 more
doaj +1 more source
Optimal Power Allocation for A Massive MIMO Relay Aided Secure Communication
In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications under practical conditions. To guarantee secure communication during the long-distance transmission, the massive MIMO (M-MIMO) relaying ...
Chen, Jian +2 more
core +1 more source
Aging‐associated physiological and molecular alterations pose significant challenges in cancer management among India's elderly. Limited geriatric oncology expertise, financial constraints, and inadequate specialized care exacerbate disparities. Strategic expansion of insurance coverage, integration of palliative care, and infrastructural advancements ...
Nihanthy D. Sreenath +3 more
wiley +1 more source
On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels With Statistical CSIT
In this paper, we consider secure transmissions in ergodic Rayleigh fast-faded multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) wiretap channels with only statistical channel state information at the transmitter (CSIT).
Lin, Cheng-Liang, Lin, Shih-Chun
core +1 more source

