Results 41 to 50 of about 139,119 (288)
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu +4 more
doaj +1 more source
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source
Feasibility of positive secrecy rate in wiretap interference channels [PDF]
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1.
Kalantari, Ashkan +4 more
openaire +2 more sources
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core +1 more source
Secrecy Communication with Security Rate Measure
10 pages, submitted to IEEE ITW 2015.
Yu, Lei, Li, Houqiang, Li, Weiping
openaire +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng +4 more
doaj +1 more source
Polar Coding for the Multiple Access Channel With Confidential Messages
The multiple access channel with confidential messages (MAC-CM) generalizes the traditional multiple access channel by allowing both users to receive channel outputs.
Haowei Wang +3 more
doaj +1 more source
Finite-Blocklength Bounds for Wiretap Channels
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are shown to be tighter than existing bounds.
Poor, H. Vincent +2 more
core +1 more source
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source

