Results 231 to 240 of about 6,690 (268)
Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. [PDF]
Zhang J +5 more
europepmc +1 more source
We describe the functional anatomy of masticatory muscles in nine opossums, finding a generalized anatomical pattern with differences related to skull morphology. Variation in quantitative myological data and estimated bite force was mostly related to size, and the increase in bite force supports dietary diversification associated with size increase ...
Juann A. F. H. Abreu, Diego Astúa
wiley +1 more source
Secrecy Outage Performance Analysis of Wirelessly Powered IoT System with Randomly Moving Receiving Nodes. [PDF]
Blagojević V +3 more
europepmc +1 more source
Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network. [PDF]
Tran M +5 more
europepmc +1 more source
Enhancing covert communication in NOMA systems with joint security and covert design. [PDF]
Doan TB, Nguyen TH.
europepmc +1 more source
Energy Efficiency for 5G and Beyond 5G: Potential, Limitations, and Future Directions. [PDF]
Ichimescu A +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Erasure adversarial wiretap channels
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword.
Pengwei Wang +2 more
openaire +1 more source
Identification via wiretap channels
Proceedings of 1994 IEEE International Symposium on Information Theory, 2002The wiretap channel can be viewed as a probabilistic model for cryptography. The channel has two outputs. One is for the legitimate receiver and the other is for the wiretapper. The goal of communication is to send messages to the legitimate receiver while the wiretapper must be kept ignorant.
R. Ahlswede, null Zhen Zhang
openaire +1 more source
Wiretap Channel with Correlated Sources
2014 IEEE International Conference on Cloud Engineering, 2014This paper studies the problem of secret-message transmission over a wiretap channel with correlated sources in the presence of an eavesdropper who has no source observation. A coding scheme is proposed based on a careful combination of 1) Wyner-Ziv's source coding to generate secret key from correlated sources based on a certain cost on the channel, 2)
Yanling Chen, Ning Cai, Aydin Sezgin
openaire +1 more source
Broadcasting over fading wiretap channels
2012 IEEE International Symposium on Information Theory Proceedings, 2012Broadcasting over the fading wiretap channel is investigated for the situation without the channel state information (CSI) at the transmitter and subject to a delay constraint. A new broadcast approach is developed, which integrates secure superposition coding studied in the authors' previous work and embedded coding in a hybrid fashion.
Yingbin Liang +3 more
openaire +1 more source

