The dialogic performativity of secrecy and transparency
How does the pursuit of transparency and insight have a tendency to produce secrecy? And vice versa? In popular and political discourse, secrecy and transparency are usually depicted as mutually exclusive practices. At the same time, we know from extant research that the two are closely related, that they each have performative effects, and tend to ...
Fan, Ziyun, Christensen, Lars Thøger
openaire +3 more sources
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime [PDF]
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage.
Diana Pamela Moya Osorio +2 more
openaire +4 more sources
Secrecy performance of terahertz wireless links in rain and snow [PDF]
Wireless communication technique at terahertz (THz) frequencies is regarded as the most potential candidate for future wireless networks due to its wider frequency bandwidth and higher data capacity when compared to that employing radio frequency (RF) and millimeter wave (mmWave).
Rong Wang +3 more
openaire +2 more sources
Improving Secrecy Performance of a Wirelessly Powered Network [PDF]
This paper considers the secrecy communication of a wirelessly powered network, where an energy-constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon, while an eavesdropper (Eve) intends to intercept the information.
Zhuo Chen 0002 +3 more
openaire +1 more source
Secrecy performance analysis of IRS-NOMA systems
AbstractIn this paper, we propose to utilize an intelligent reflecting surface (IRS) as a promising technology to enhance the coverage and physical layer security of non-orthogonal multiple access (NOMA) system. In particular, an IRS-assisted NOMA system is considered with the aid of careful channel ordering of the NOMA users, in which the transmitter ...
Hossein Ghavami, Bahareh Akhbari
openaire +2 more sources
Secrecy Performance of Wirelessly Powered Wiretap Channels [PDF]
This paper considers a wirelessly powered wiretap channel, where an energy constrained multi-antenna information source, powered by a dedicated power beacon, communicates with a legitimate user in the presence of a passive eavesdropper. Based on a simple time-switching protocol, where power transfer and information transmission are separated in time ...
Xin Jiang 0009 +5 more
openaire +3 more sources
Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks [PDF]
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper.
Fazio, Peppino +4 more
core +1 more source
On the Use of HAPS to Increase Secrecy Performance in Satellite Networks [PDF]
In this paper, we investigate the secrecy performance of radio frequency (RF) eavesdropping for a high altitude platform station (HAPS) aided satellite communication (SatCom) system. More precisely, we propose a new SatCom scheme where a HAPS node is used as an intermediate relay to transmit the satellite's signal to the ground station (GS).
Olfa Ben Yahia +2 more
openaire +2 more sources
On Secrecy Performance of Mixed THz-FSO Relaying System
<p>Terahertz (THz) frequency band and free-space optical (FSO) communication can be proven potential solutions to the spectrum scarcity challenges in the emerging applications in the 6G. In this direction, a mixed THz-FSO relaying system is proposed in this paper.
Ahmad Ijaz, Huusko Jyrki, Singh Rupender
openaire +2 more sources
Secrecy Performance of SIMO Underlay Cognitive Radio Networks Over α – μ Fading Channels
This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary transmitter transmits its secret message to a multi-antenna equipped secondary ...
Suneel Yadav, Devendra Singh Gurjar
doaj +1 more source

