Results 1 to 10 of about 139,334 (281)
Rate-Distortion Theory for Secrecy Systems [PDF]
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary.
Cuff, Paul, Schieler, Curt
core +3 more sources
Secrecy Rate Optimization for Secure Multicast Communications [PDF]
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications.
Cumanan, Kanapathippillai +3 more
openaire +4 more sources
We investigate the transmission of a secret message from Alice to Bob in the presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes.
Linda Senigagliesi +2 more
doaj +2 more sources
Achievable Secrecy Rates of an Energy Harvesting Device [PDF]
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro +2 more
core +4 more sources
Intelligent reflecting surface-aided MIMO secrecy rate maximization
This paper considers the intelligent reflecting surface-aided MIMO secrecy rate maximization. We apply the alternating optimization to maximize the secrecy rate of the MIMO wiretap channels. We first provide the closed-form solution to each subproblem of
Minsik Kim, Daeyoung Park
doaj +2 more sources
This paper analyzes the achievable secrecy rate in a millimeter wave (mmWave) ad hoc network with multi‐array antenna transmission in the presence of non‐colluding and colluding eavesdroppers.
Ahmed Fathy Darwesh, Abraham O. Fapojuwo
doaj +1 more source
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
Security Analysis of QAM Quantum-Noise Randomized Cipher System
Applying the quadrature amplitude modulation (QAM) format, quantum-noise randomized cipher (QNRC) systems hide the signal states in quantum phase noise and amplitude noise to prevent eavesdropping. In this paper, based on the traditional wire-tap channel
Yukai Chen +4 more
doaj +1 more source
Secure broadcasting : The secrecy rate region [PDF]
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate ...
Ghadamali Bagherikaram +2 more
openaire +1 more source
Enhancing secrecy rates in a wiretap channel
Submitted to a journal for possible publication. Part of the paper was presented in 2013 IEEE International Conference on Communications Workshop on Physical Layer Security (ICC), Budapest ...
Shahid M. Shah, Vinod Sharma
openaire +3 more sources

