A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay. [PDF]
Guo X, Tu S, Yan D, Wang Y.
europepmc +1 more source
Related searches:
Outage Constrained Secrecy Throughput Maximization for DF Relay Networks
IEEE Transactions on Communications, 2015In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region,
Tong-Xing Zheng +2 more
exaly +2 more sources
Exact Secrecy Throughput of MANETs with Guard Zone
2016 International Conference on Networking and Network Applications (NaNA), 2016Different from previous works that mainly focus on deriving the scaling results for secrecy throughput of mobile ad hoc networks (MANETs), this paper studies the exact secrecy throughput of a cell-partitioned MANET with groupbased scheduling to eliminate interference from simultaneous transmissions.
Shuangrui Zhao +2 more
exaly +2 more sources
Exact secrecy throughput capacity study in mobile ad hoc networks
Ad Hoc Networks, 2018Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Yuanyu Zhang +2 more
exaly +2 more sources
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels
IEEE Transactions on Information Forensics and Security, 2017In this paper, the secure transmission strategy for a multi-input-single-output multi-eavesdropper system with coexistence of a secure user (Bob) and a normal user (NU) is investigated. The NU and Bob require normal and secure data transmissions, respectively, and thus, the stream for the NU can be exploited to confuse the eavesdroppers.
Wei Wang, Kah Chan` Teh, Kwok Hung Li
exaly +2 more sources
Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization
IEEE Wireless Communications Letters, 2016This letter studies the secure communication between a wireless powered source node and a destination node in the presence of multiple eavesdroppers. We propose a hybrid base station (BS) scheme where the hybrid BS first transfers wireless power to the source and then performs cooperative jamming while the source transmits the information signal using ...
Ling Tang, Qianmu Li
exaly +2 more sources
Maximum Secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints
IEEE Signal Processing Letters, 2015We evaluate the effective secrecy throughput of the multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel with antenna selection at the legitimate transmitter. The optimal target secrecy rate that maximizes the effective secrecy throughput is obtained and confirmed by numerical results.
Marcos Eduardo Pivaro Monteiro +2 more
exaly +2 more sources

