Results 81 to 90 of about 3,650 (187)

Phase Noise in Real‐World Twin‐Field Quantum Key Distribution

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 6, June 2024.
This study explores the impact of various noise sources on twin‐field quantum key distribution (TF‐QKD) systems, focusing on phase noise from photon sources and fibers. Results show that different TF‐QKD protocols are similarly affected by phase noise.
Gianluca Bertaina   +11 more
wiley   +1 more source

QUICK3$^3$ ‐ Design of a Satellite‐Based Quantum Light Source for Quantum Communication and Extended Physical Theory Tests in Space

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
Quantum communication is limited due to the need to generate single photon states and the transmission of these over long distances. The design and space‐qualification of a single photon source compatible with nanosatellites in the QUICK3 mission are presented.
Najme Ahmadi   +21 more
wiley   +1 more source

A research on cross‐chain and interoperation methods of fusion protocol

open access: yesIET Blockchain, Volume 4, Issue 1, Page 18-29, March 2024.
Abstract At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different scenarios is poor, and it may not fit in different business fields.
Li Ming   +4 more
wiley   +1 more source

Physical Layer Security in an Untrusted Energy Harvesting Relay Network

open access: yesIEEE Access, 2019
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi   +5 more
doaj   +1 more source

Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay [PDF]

open access: yesRadioengineering, 2017
In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper.
B. Ali   +3 more
doaj  

Secure Computation-and-Forward with Linear Codes

open access: yes, 2018
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes.
Hayashi, Masahito   +2 more
core  

Machine Learning-Based Antenna Selection in Untrusted Relay Networks [PDF]

open access: yes, 2019
This paper studies the transmit antenna selection based on machine learning (ML) schemes in untrusted relay networks. First, we state the conventional antenna selection scheme. Then, we implement three ML schemes, namely, the support vector machine-based scheme, the naive-Bayes-based scheme, and the k-nearest neighbors-based scheme, which are applied ...
Yao, Rugui   +3 more
openaire   +2 more sources

Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors

open access: yesIEEE Access, 2018
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each source signal ...
Lihua Gong   +3 more
doaj   +1 more source

Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network

open access: yesIEEE Access, 2018
In this paper, a destination-assisted-jamming-based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the ...
Rugui Yao   +5 more
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy