Results 81 to 90 of about 139,758 (194)

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

open access: yesIEEE Access, 2017
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao   +3 more
doaj   +1 more source

Wireless Secure Signal Transmission for Distributed Intelligent Surface-Aided Millimeter Wave Systems

open access: yesIEEE Access, 2020
The optimization of the secrecy rate of the distributed intelligent reflecting surfaces (IRSs)-assisted millimeter wave (mmWave) communication system is studied in this paper.
Yue Xiu, Zhongpei Zhang
doaj   +1 more source

Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels

open access: yes, 2015
This letter studies parallel independent Gaussian channels with uncertain eavesdropper channel state information (CSI). Firstly, we evaluate the probability of zero secrecy rate in this system for (i) given instantaneous channel conditions and (ii) a ...
Kandhway, Kundan   +2 more
core   +1 more source

Secrecy, Computational Loads and Rates in Practical Quantum Cryptography

open access: yesAlgorithmica, 2002
Final version of paper; will appear in Algorithmica, Special Issue on Quantum Computation and ...
Gilbert, Gerald, Hamrick, Michael
openaire   +2 more sources

Effective Secrecy Rate for a Downlink NOMA Network [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2019
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study focuses on the downlink of a non-orthogonal multiple access (NOMA) network with one base station, multiple single-antenna NOMA users and an eavesdropper.
Wenjuan Yu   +4 more
openaire   +4 more sources

Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections

open access: yesIEEE Access, 2018
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin   +5 more
doaj   +1 more source

Cooperation with an Untrusted Relay: A Secrecy Perspective

open access: yes, 2009
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help.
He, Xiang, Yener, Aylin
core   +2 more sources

Some New Results on the Multiple-AccessWiretap Channel

open access: yesEntropy, 2014
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj   +1 more source

On the Optimality of Secret Key Agreement via Omniscience

open access: yes, 2018
For the multiterminal secret key agreement problem under a private source model, it is known that the maximum key rate, i.e., the secrecy capacity, can be achieved through communication for omniscience, but the omniscience strategy can be strictly ...
Chan, Chung   +3 more
core   +1 more source

Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise

open access: yes, 2016
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy