Results 1 to 10 of about 139,334 (281)

Rate-Distortion Theory for Secrecy Systems [PDF]

open access: yesIEEE Transactions on Information Theory, 2013
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary.
Cuff, Paul, Schieler, Curt
core   +3 more sources

Secrecy Rate Optimization for Secure Multicast Communications [PDF]

open access: yesIEEE Journal of Selected Topics in Signal Processing, 2016
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications.
Cumanan, Kanapathippillai   +3 more
openaire   +4 more sources

Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
We investigate the transmission of a secret message from Alice to Bob in the presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes.
Linda Senigagliesi   +2 more
doaj   +2 more sources

Achievable Secrecy Rates of an Energy Harvesting Device [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2016
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro   +2 more
core   +4 more sources

Intelligent reflecting surface-aided MIMO secrecy rate maximization

open access: yesICT Express, 2022
This paper considers the intelligent reflecting surface-aided MIMO secrecy rate maximization. We apply the alternating optimization to maximize the secrecy rate of the MIMO wiretap channels. We first provide the closed-form solution to each subproblem of
Minsik Kim, Daeyoung Park
doaj   +2 more sources

Achievable secrecy rate analysis in mmWave ad hoc networks with multi‐array antenna transmission and artificial noise

open access: yesIET Communications, 2021
This paper analyzes the achievable secrecy rate in a millimeter wave (mmWave) ad hoc network with multi‐array antenna transmission in the presence of non‐colluding and colluding eavesdroppers.
Ahmed Fathy Darwesh, Abraham O. Fapojuwo
doaj   +1 more source

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Security Analysis of QAM Quantum-Noise Randomized Cipher System

open access: yesIEEE Photonics Journal, 2020
Applying the quadrature amplitude modulation (QAM) format, quantum-noise randomized cipher (QNRC) systems hide the signal states in quantum phase noise and amplitude noise to prevent eavesdropping. In this paper, based on the traditional wire-tap channel
Yukai Chen   +4 more
doaj   +1 more source

Secure broadcasting : The secrecy rate region [PDF]

open access: yes2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate ...
Ghadamali Bagherikaram   +2 more
openaire   +1 more source

Enhancing secrecy rates in a wiretap channel

open access: yesDigital Communications and Networks, 2020
Submitted to a journal for possible publication. Part of the paper was presented in 2013 IEEE International Conference on Communications Workshop on Physical Layer Security (ICC), Budapest ...
Shahid M. Shah, Vinod Sharma
openaire   +3 more sources

Home - About - Disclaimer - Privacy