Results 221 to 230 of about 9,853 (272)

Collaborative Genomics for Dystonia in Central and Eastern Europe: Successes Achieved, New Frontiers Ahead

open access: yes
Movement Disorders, EarlyView.
Robert Jech   +21 more
wiley   +1 more source

Outage Constrained Secrecy Throughput Maximization for DF Relay Networks

IEEE Transactions on Communications, 2015
In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region,
Tong-Xing Zheng   +2 more
exaly   +2 more sources

Exact Secrecy Throughput of MANETs with Guard Zone

2016 International Conference on Networking and Network Applications (NaNA), 2016
Different from previous works that mainly focus on deriving the scaling results for secrecy throughput of mobile ad hoc networks (MANETs), this paper studies the exact secrecy throughput of a cell-partitioned MANET with groupbased scheduling to eliminate interference from simultaneous transmissions.
Shuangrui Zhao   +2 more
exaly   +2 more sources

Exact secrecy throughput capacity study in mobile ad hoc networks

Ad Hoc Networks, 2018
Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Yuanyu Zhang   +2 more
exaly   +2 more sources

Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels

IEEE Transactions on Information Forensics and Security, 2017
In this paper, the secure transmission strategy for a multi-input-single-output multi-eavesdropper system with coexistence of a secure user (Bob) and a normal user (NU) is investigated. The NU and Bob require normal and secure data transmissions, respectively, and thus, the stream for the NU can be exploited to confuse the eavesdroppers.
Wei Wang, Kah Chan` Teh, Kwok Hung Li
exaly   +2 more sources

Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization

IEEE Wireless Communications Letters, 2016
This letter studies the secure communication between a wireless powered source node and a destination node in the presence of multiple eavesdroppers. We propose a hybrid base station (BS) scheme where the hybrid BS first transfers wireless power to the source and then performs cooperative jamming while the source transmits the information signal using ...
Ling Tang, Qianmu Li
exaly   +2 more sources

Maximum Secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints

IEEE Signal Processing Letters, 2015
We evaluate the effective secrecy throughput of the multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel with antenna selection at the legitimate transmitter. The optimal target secrecy rate that maximizes the effective secrecy throughput is obtained and confirmed by numerical results.
Marcos Eduardo Pivaro Monteiro   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy