Results 81 to 90 of about 3,650 (187)
Phase Noise in Real‐World Twin‐Field Quantum Key Distribution
This study explores the impact of various noise sources on twin‐field quantum key distribution (TF‐QKD) systems, focusing on phase noise from photon sources and fibers. Results show that different TF‐QKD protocols are similarly affected by phase noise.
Gianluca Bertaina +11 more
wiley +1 more source
Quantum communication is limited due to the need to generate single photon states and the transmission of these over long distances. The design and space‐qualification of a single photon source compatible with nanosatellites in the QUICK3 mission are presented.
Najme Ahmadi +21 more
wiley +1 more source
A research on cross‐chain and interoperation methods of fusion protocol
Abstract At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different scenarios is poor, and it may not fit in different business fields.
Li Ming +4 more
wiley +1 more source
Physical Layer Security in an Untrusted Energy Harvesting Relay Network
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi +5 more
doaj +1 more source
Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay [PDF]
In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper.
B. Ali +3 more
doaj
Secure Computation-and-Forward with Linear Codes
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes.
Hayashi, Masahito +2 more
core
Machine Learning-Based Antenna Selection in Untrusted Relay Networks [PDF]
This paper studies the transmit antenna selection based on machine learning (ML) schemes in untrusted relay networks. First, we state the conventional antenna selection scheme. Then, we implement three ML schemes, namely, the support vector machine-based scheme, the naive-Bayes-based scheme, and the k-nearest neighbors-based scheme, which are applied ...
Yao, Rugui +3 more
openaire +2 more sources
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each source signal ...
Lihua Gong +3 more
doaj +1 more source
Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network
In this paper, a destination-assisted-jamming-based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the ...
Rugui Yao +5 more
doaj +1 more source
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source

