Results 251 to 260 of about 9,853 (272)
Some of the next articles are maybe not open access.
2014 IEEE International Conference on Communications Workshops (ICC), 2014
The issue of physical layer security for the wireless communication with slow fading is addressed in this paper, and the secrecy outage performance is concerned. The system is modeled as a wiretap channel, and each of the transmitter and receivers is equipped with a single antenna.
null Pengcheng Mu +4 more
openaire +1 more source
The issue of physical layer security for the wireless communication with slow fading is addressed in this paper, and the secrecy outage performance is concerned. The system is modeled as a wiretap channel, and each of the transmitter and receivers is equipped with a single antenna.
null Pengcheng Mu +4 more
openaire +1 more source
An Achievable Secrecy Throughput of Hybrid-ARQ Protocols for Block Fading Channels
2007 IEEE International Symposium on Information Theory, 2007In applications of wireless packet-oriented data networks, a special coding scheme, the hybrid automatic retransmission request (HARQ) exhibits high throughput efficiency by adapting its error correcting code redundancy to channel conditions. Motivated by the increasing importance of secure communication over wireless networks, we investigate secure ...
Xiaojun Tang +2 more
openaire +1 more source
Effective Secrecy Throughput Analysis Over Underwater Wireless Optical Channel
2023 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2023Auntora Roy Chowdhury +2 more
openaire +1 more source
Secrecy Throughput Optimization in the Buffer-aided MIMO Full-Duplex Relaying System
2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019In this paper, the physical layer security is studied in a buffer-aided MIMO relaying system, which consists of a source, a destination, a multi-antenna relay and multiple eavesdroppers. The relay operates in either half-duplex mode or full-duplex mode, based on the channel state information (CSI) of legitimate links.
Yue Zhao +3 more
openaire +1 more source
Bargaining over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications
IEEE Transactions on Information Forensics and Security, 2016The problem of ensuring the secrecy of a communication while simultaneously maintaining sufficient throughput is a fundamental challenge facing secret communication. One of the challenges for such problems is that the optimal solution for one of objective might be not optimal for the other (e.g., an increase in secrecy might yield a decrease in ...
Andrey Garnaev, Wade Trappe
openaire +1 more source
Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks
IEEE Wireless Communications Letters, 2022Li Ping Qian +4 more
openaire +1 more source
2022 8th International Conference on Big Data Computing and Communications (BigCom), 2022
Sihui Shang, Pinyi Ren, Dongyang Xu
openaire +1 more source
Sihui Shang, Pinyi Ren, Dongyang Xu
openaire +1 more source
Secrecy Throughput Maximization for IRS-Aided MIMO Wireless Powered Communication Networks
IEEE Transactions on Communications, 2022Weiping Shi +4 more
openaire +1 more source
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay
2022 International Conference on Networking and Network Applications (NaNA), 2022Yeqiu Xiao +4 more
openaire +1 more source

