Results 81 to 90 of about 139,758 (194)
Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao +3 more
doaj +1 more source
The optimization of the secrecy rate of the distributed intelligent reflecting surfaces (IRSs)-assisted millimeter wave (mmWave) communication system is studied in this paper.
Yue Xiu, Zhongpei Zhang
doaj +1 more source
Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels
This letter studies parallel independent Gaussian channels with uncertain eavesdropper channel state information (CSI). Firstly, we evaluate the probability of zero secrecy rate in this system for (i) given instantaneous channel conditions and (ii) a ...
Kandhway, Kundan +2 more
core +1 more source
Secrecy, Computational Loads and Rates in Practical Quantum Cryptography
Final version of paper; will appear in Algorithmica, Special Issue on Quantum Computation and ...
Gilbert, Gerald, Hamrick, Michael
openaire +2 more sources
Effective Secrecy Rate for a Downlink NOMA Network [PDF]
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study focuses on the downlink of a non-orthogonal multiple access (NOMA) network with one base station, multiple single-antenna NOMA users and an eavesdropper.
Wenjuan Yu +4 more
openaire +4 more sources
Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin +5 more
doaj +1 more source
Cooperation with an Untrusted Relay: A Secrecy Perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help.
He, Xiang, Yener, Aylin
core +2 more sources
Some New Results on the Multiple-AccessWiretap Channel
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj +1 more source
On the Optimality of Secret Key Agreement via Omniscience
For the multiterminal secret key agreement problem under a private source model, it is known that the maximum key rate, i.e., the secrecy capacity, can be achieved through communication for omniscience, but the omniscience strategy can be strictly ...
Chan, Chung +3 more
core +1 more source
Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K. +2 more
core +1 more source

