Results 31 to 40 of about 139,758 (194)

Monetary policy, secrecy, and federal funds rate behavior [PDF]

open access: yesJournal of Monetary Economics, 1985
Abstract The behavior of the Federal Reserve System can be characterized as secretive. One common justification for this secrecy is the financial markets will overreact to information, causing undue variability in interest rates. This paper examines the credibility of this assertion under the post-October 1979 non-borrowed reserves operating ...
openaire   +2 more sources

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +1 more source

Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs [PDF]

open access: yes, 2013
Optimal power allocation for orthogonal frequency division multiplexing (OFDM) wiretap channels with Gaussian channel inputs has already been studied in some previous works from an information theoretical viewpoint.
Chong-yung Chi   +7 more
core   +1 more source

On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT

open access: yesIEEE Access, 2019
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source sends confidential information to a destination via an energy-constrained UAV-mounted amplify-and-forward relay in the presence of a ...
Milad Tatar Mamaghani, Yi Hong
doaj   +1 more source

Downlink Physical Layer Security Transmission Method Based on Zero-sum Game [PDF]

open access: yesJisuanji gongcheng, 2018
In the Multi-downlink network,the interference among nonorthogonal channels and the malicious interference makes destination nodes not meet the demand of Quality of Service(QoS).So a security transmission method based on zero-sum game model is proposed ...
XU Zhaoye,LU Ruimin
doaj   +1 more source

Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

open access: yes, 2014
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core   +1 more source

Mobile jammers for secrecy rate maximization in cooperative networks [PDF]

open access: yes2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted. The communication is assisted by multiple multi-antenna cooperating nodes (helpers) who have the ability to move.
Kalogerias, Dionysios S.   +3 more
openaire   +2 more sources

Antenna selection algorithm based on cut-off rate for secure spatial modulation with finite alphabet input

open access: yesTongxin xuebao, 2020
For the security transmission of artificial noise with finite alphabet inputs in secure spatial modulation system,an antenna selection algorithm based on cut-off rate (COR) was proposed.Considering that it was difficult to obtain the closed-form ...
Qingfeng DING   +3 more
doaj   +2 more sources

Simultaneous Wireless Information and Power Transfer in Multi-User OFDMA Networks with Physical Secrecy

open access: yesSensors, 2022
This paper considers simultaneous wireless information and power transfer (SWIPT) from a base station to multiple Internet of Things (IoT) nodes via orthogonal frequency-division multiple access (OFDMA), where every node can eavesdrop on the subcarriers ...
Pubet Sangmahamad   +2 more
doaj   +1 more source

Feasibility of positive secrecy rate in wiretap interference channels [PDF]

open access: yes2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2014
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1.
Kalantari, Ashkan   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy