Results 41 to 50 of about 139,758 (194)

Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code

open access: yesEntropy, 2023
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu   +4 more
doaj   +1 more source

Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel

open access: yes, 2010
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core   +1 more source

A Large Deviations Approach to Secure Lossy Compression

open access: yes, 2015
We consider a Shannon cipher system for memoryless sources, in which distortion is allowed at the legitimate decoder. The source is compressed using a rate distortion code secured by a shared key, which satisfies a constraint on the compression rate, as ...
Merhav, Neri, Weinberger, Nir
core   +1 more source

Secrecy Communication with Security Rate Measure

open access: yes, 2015
10 pages, submitted to IEEE ITW 2015.
Yu, Lei, Li, Houqiang, Li, Weiping
openaire   +2 more sources

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks

open access: yesIEEE Open Journal of the Communications Society
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng   +4 more
doaj   +1 more source

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game

open access: yesDianxin kexue, 2014
By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network.
Shigen Shen   +5 more
doaj   +2 more sources

Polar Coding for the Multiple Access Channel With Confidential Messages

open access: yesIEEE Access, 2020
The multiple access channel with confidential messages (MAC-CM) generalizes the traditional multiple access channel by allowing both users to receive channel outputs.
Haowei Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy