Results 31 to 40 of about 6,690 (268)
A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes
Visible light communication (VLC) can provide short-range optical wireless communication together with illumination using LED lightings. Since VLC channel is an open wireless channel, physical-layer security is desirable in order to hide secret ...
Zhen Che +6 more
doaj +1 more source
Imperfect Secrecy in Wiretap Channel II [PDF]
Submitted to the IEEE Transactions on Information ...
Cheng, Fan +2 more
openaire +3 more sources
Uncertain wiretap channels and secure estimation [PDF]
Long version of a paper to be presented at ISIT ...
Wiese, Moritz +5 more
openaire +2 more sources
Secret Sharing over Fast-Fading MIMO Wiretap Channels
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different ...
Bloch Matthieu, Wong TanF, Shea JohnM
doaj +2 more sources
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward (RaF) cognitive relay multi-channel wiretap networks over correlated fading channels, in which the eavesdropper can wiretap the information from source and relays ...
Mu Li +4 more
doaj +1 more source
Strong secrecy for erasure wiretap channels [PDF]
Submitted to the Information Theory Workship (ITW) 2010 ...
Suresh, Ananda T. +4 more
openaire +2 more sources
Randomized Turbo Codes for the Wiretap Channel [PDF]
We study application of parallel and serially concatenated convolutional codes known as turbo codes to the randomized encoding scheme introduced by Wyner for physical layer security. For this purpose, we first study how randomized convolutional codes can be constructed. Then, we use them as building blocks for developing randomized turbo codes. We also
Nooraiepour, Alireza, Duman, Tolga M.
openaire +3 more sources
Randomized Convolutional Codes for the Wiretap Channel [PDF]
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as a way of confusing the eavesdropper over a wiretap channel. We describe optimal and practical sub-optimal decoders for the main and the eavesdropper’s channels, and estimate the security gap, which is used as the main metric.
Alireza Nooraiepour, Tolga Mete Duman
openaire +3 more sources
Secrecy Capacity of the Extended Wiretap Channel II with Noise
The secrecy capacity of an extended communication model of wiretap channelII is determined. In this channel model, the source message is encoded into a digital sequence of length N and transmitted to the legitimate receiver through a discrete memoryless ...
Dan He, Wangmei Guo, Yuan Luo
doaj +1 more source
The Degraded Poisson Wiretap Channel [PDF]
Providing security guarantees for wireless communication is critically important for today's applications. While previous work in this area has concentrated on radio frequency (RF) channels, providing security guarantees for RF channels is inherently difficult because they are prone to rapid variations due small scale fading.
Laourine, Amine, Wagner, Aaron B.
openaire +2 more sources

