Results 1 to 10 of about 6,690 (268)

Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter [PDF]

open access: yesEntropy, 2019
In this paper, we propose two feedback coding schemes for the action-dependent wiretap channel with noncausal state at the transmitter. The first scheme follows from the already existing secret key based feedback coding scheme for the wiretap channel ...
Haonan Zhang, Linman Yu, Bin Dai
doaj   +2 more sources

Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code [PDF]

open access: yesEntropy, 2023
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu   +4 more
doaj   +2 more sources

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper [PDF]

open access: yesEntropy, 2022
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject ...
Rémi A. Chou, Aylin Yener
doaj   +2 more sources

New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel [PDF]

open access: yesEntropy, 2021
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on
Guangfen Xie, Bin Dai
doaj   +2 more sources

Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel [PDF]

open access: yesEntropy, 2023
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications.
Daniel Harman   +5 more
doaj   +2 more sources

On Best Erasure Wiretap Codes: Equivocation Matrices and Design Principles [PDF]

open access: yesEntropy
Physical-layer security can aid in establishing secure telecommunication networks including cellular, Internet of Things, and telemetry networks, among others. Channel sounding techniques and/or telemetry systems for reporting channel conditions, coupled
Willie K. Harrison   +3 more
doaj   +2 more sources

Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution [PDF]

open access: yesEntropy, 2023
This paper studies the secrecy capacity of an n-dimensional Gaussian wiretap channel under a peak power constraint. This work determines the largest peak power constraint R¯n, such that an input distribution uniformly distributed on a single sphere is ...
Antonino Favano   +2 more
doaj   +2 more sources

Encoding Individual Source Sequences for the Wiretap Channel [PDF]

open access: yesEntropy, 2021
We consider the problem of encoding a deterministic source sequence (i.e., individual sequence) for the degraded wiretap channel by means of an encoder and decoder that can both be implemented as finite-state machines.
Neri Merhav
doaj   +2 more sources

Smoothing of Binary Codes, Uniform Distributions, and Applications [PDF]

open access: yesEntropy, 2023
The action of a noise operator on a code transforms it into a distribution on the respective space. Some common examples from information theory include Bernoulli noise acting on a code in the Hamming space and Gaussian noise acting on a lattice in the ...
Madhura Pathegama, Alexander Barg
doaj   +2 more sources

Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels. As the first model, we consider the degraded multireceiver wiretap channel where
Ekrem Ersen, Ulukus Sennur
doaj   +10 more sources

Home - About - Disclaimer - Privacy