Results 71 to 80 of about 139,758 (194)

Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley   +1 more source

Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

open access: yesIEEE Open Journal of the Communications Society
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A K-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers.
Elmira Shahraki   +2 more
doaj   +1 more source

Wiretap Channel with Information Embedding on Actions

open access: yesEntropy, 2014
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver.
Xinxing Yin, Zhi Xue
doaj   +1 more source

Multi-Antenna Gaussian Broadcast Channels with Confidential Messages

open access: yes, 2008
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks.
Liu, Ruoheng, Poor, H. Vincent
core   +1 more source

Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions

open access: yesPhotonics
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary.
Yahya M. Al-Moliki   +3 more
doaj   +1 more source

Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]

open access: yesJisuanji gongcheng, 2019
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj   +1 more source

Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel

open access: yes, 2007
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna.
Liu, Nan   +2 more
core   +2 more sources

On the secrecy rate region for the interference channel

open access: yes2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users
Koyluoglu, O. Ozan, Gamal, Hesham El
openaire   +2 more sources

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

open access: yes, 2012
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy