Results 101 to 110 of about 139,758 (194)
On the Secrecy Capacity of Fading Channels
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El +2 more
core +2 more sources
Evaluation of Secrecy Rate in Cooperative Communication System
Cooperative system is a tendency for future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing ...
Cheng-Ying Yang +2 more
openaire +2 more sources
Secrecy Rate Region of SWIPT Wiretap Interference Channels
The secrecy rate region of wiretap interference channels with a multi-antenna passive eavesdropper is studied under receiver energy harvesting constraints. To stay operational in the network, the legitimate receivers demand energy alongside information, which is fulfilled by power transmission and exploiting a power splitting (PS) receiver.
Kariminezhad, Ali +3 more
openaire +2 more sources
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI
doaj +2 more sources
Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward relay is considered, which can decode the source message correctly only if a predefined signal ...
Chinmoy Kundu +5 more
doaj +1 more source
Integrating visible light communication (VLC) with the reconfigurable intelligent surface (RIS) significantly enhances physical layer security by enabling precise directional signal control and dynamic adaptation to the communication environment.
Omar Maraqa +3 more
doaj +1 more source
This paper proposes a Reptile-based Meta-Reinforcement Learning (Meta-RL) framework for secure, adaptive multi-hop routing in Mobile Ad Hoc Networks (MANETs) enhanced by Reconfigurable Intelligent Surfaces (RIS).
M. Stella Mercy, R. Suresh Babu
doaj +1 more source
Secrecy rates of finite-input intersymbol interference channels
Dışa açık doğaları gereği kablosuz iletişim ağlarında güvenliğin sağlanması kritik bir öneme sahiptir. Bu güvenliği fiziksel katmanda sağlamak ise üst katmandaki geleneksel şifreleme yöntemlerine hem iyi bir alternatif hem de ilave bir güvenliktir. Son on yıla baktığımızda, bir çok çalışma tarafından fiziksel katmandaki çalışmaların güvenliği sağlama ...
openaire +3 more sources
Secrecy Rate Maximization for Movable Antenna-Aided STAR-RIS in Integrated Sensing and Communication Systems. [PDF]
Chen G +6 more
europepmc +1 more source
Ergodic secrecy rate and outage probability in NOMA IRS massive MIMO networks with jamming. [PDF]
Zhu M +6 more
europepmc +1 more source

