Results 41 to 50 of about 139,758 (194)
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu +4 more
doaj +1 more source
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core +1 more source
A Large Deviations Approach to Secure Lossy Compression
We consider a Shannon cipher system for memoryless sources, in which distortion is allowed at the legitimate decoder. The source is compressed using a rate distortion code secured by a shared key, which satisfies a constraint on the compression rate, as ...
Merhav, Neri, Weinberger, Nir
core +1 more source
Secrecy Communication with Security Rate Measure
10 pages, submitted to IEEE ITW 2015.
Yu, Lei, Li, Houqiang, Li, Weiping
openaire +2 more sources
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine +14 more
wiley +1 more source
Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng +4 more
doaj +1 more source
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B. +4 more
core +1 more source
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski +9 more
wiley +1 more source
Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game
By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network.
Shigen Shen +5 more
doaj +2 more sources
Polar Coding for the Multiple Access Channel With Confidential Messages
The multiple access channel with confidential messages (MAC-CM) generalizes the traditional multiple access channel by allowing both users to receive channel outputs.
Haowei Wang +3 more
doaj +1 more source

