Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis [PDF]
This paper studies the secrecy rate maximization problem of a secure wireless communication system in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming with the help of multiple jammers.
K. Cumanan +3 more
semanticscholar +1 more source
Concealing in the Public Interest, or Why We Must Teach Secrecy
Secrecy as the intentional or unintentional concealment of information is the subject of investigation within the humanities, social sciences, journalism, law and legal studies.
Susan Maret
doaj
Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu +3 more
doaj +1 more source
Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs [PDF]
Optimal power allocation for orthogonal frequency division multiplexing (OFDM) wiretap channels with Gaussian channel inputs has already been studied in some previous works from an information theoretical viewpoint.
Chong-yung Chi +7 more
core +1 more source
This Is a Secret: Learning From Children’s Engagement With Surveillance and Secrecy
This article establishes the relevance of surveillance and secrecy as methodological tools, and it substantiates the argument that surveillance and secrecy are not oppositional in character, but overlap.
M. Kaufmann
semanticscholar +1 more source
Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj +1 more source
ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman +5 more
doaj +1 more source
This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay.
Van Phu Tuan, Ic-Pyo Hong
doaj +1 more source
Pembukaan Prinsip Kerahasiaan Bank sebagai Perbuatan Melawan Hukum
Banking secrecy is known in many countries in the world that has a bank financial institution. Banking secrecy is one of the most important principle. It is because the development and growth of one bank is very dependant on public trust. Confidentiality
Dinda Anna Zatika
doaj +1 more source
Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba +4 more
core +1 more source

