Results 31 to 40 of about 139,758 (194)
Monetary policy, secrecy, and federal funds rate behavior [PDF]
Abstract The behavior of the Federal Reserve System can be characterized as secretive. One common justification for this secrecy is the financial markets will overreact to information, causing undue variability in interest rates. This paper examines the credibility of this assertion under the post-October 1979 non-borrowed reserves operating ...
openaire +2 more sources
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source
Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs [PDF]
Optimal power allocation for orthogonal frequency division multiplexing (OFDM) wiretap channels with Gaussian channel inputs has already been studied in some previous works from an information theoretical viewpoint.
Chong-yung Chi +7 more
core +1 more source
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source sends confidential information to a destination via an energy-constrained UAV-mounted amplify-and-forward relay in the presence of a ...
Milad Tatar Mamaghani, Yi Hong
doaj +1 more source
Downlink Physical Layer Security Transmission Method Based on Zero-sum Game [PDF]
In the Multi-downlink network,the interference among nonorthogonal channels and the malicious interference makes destination nodes not meet the demand of Quality of Service(QoS).So a security transmission method based on zero-sum game model is proposed ...
XU Zhaoye,LU Ruimin
doaj +1 more source
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core +1 more source
Mobile jammers for secrecy rate maximization in cooperative networks [PDF]
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted. The communication is assisted by multiple multi-antenna cooperating nodes (helpers) who have the ability to move.
Kalogerias, Dionysios S. +3 more
openaire +2 more sources
For the security transmission of artificial noise with finite alphabet inputs in secure spatial modulation system,an antenna selection algorithm based on cut-off rate (COR) was proposed.Considering that it was difficult to obtain the closed-form ...
Qingfeng DING +3 more
doaj +2 more sources
This paper considers simultaneous wireless information and power transfer (SWIPT) from a base station to multiple Internet of Things (IoT) nodes via orthogonal frequency-division multiple access (OFDMA), where every node can eavesdrop on the subcarriers ...
Pubet Sangmahamad +2 more
doaj +1 more source
Feasibility of positive secrecy rate in wiretap interference channels [PDF]
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1.
Kalantari, Ashkan +4 more
openaire +2 more sources

