Results 41 to 50 of about 6,771 (265)

Uncertain wiretap channels and secure estimation [PDF]

open access: yes2016 IEEE International Symposium on Information Theory (ISIT), 2016
Long version of a paper to be presented at ISIT ...
Moritz Wiese   +5 more
openaire   +2 more sources

Secrecy Capacity of the Extended Wiretap Channel II with Noise

open access: yesEntropy, 2016
The secrecy capacity of an extended communication model of wiretap channelII is determined. In this channel model, the source message is encoded into a digital sequence of length N and transmitted to the legitimate receiver through a discrete memoryless ...
Dan He, Wangmei Guo, Yuan Luo
doaj   +1 more source

Imperfect Secrecy in Wiretap Channel II [PDF]

open access: yesIEEE Transactions on Information Theory, 2012
Submitted to the IEEE Transactions on Information ...
Fan Cheng 0002   +2 more
openaire   +3 more sources

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel

open access: yesJournal of Telecommunications and Information Technology, 2022
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj   +1 more source

Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs [PDF]

open access: yes, 2013
Optimal power allocation for orthogonal frequency division multiplexing (OFDM) wiretap channels with Gaussian channel inputs has already been studied in some previous works from an information theoretical viewpoint.
Chong-yung Chi   +7 more
core   +1 more source

On the Binary Input Gaussian Wiretap Channel with/without Output Quantization

open access: yesEntropy, 2017
In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian
Chao Qi, Yanling Chen, A. J. Han Vinck
doaj   +1 more source

Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing

open access: yes, 2014
We establish an upper bound on the rate of codes for a wiretap channel with public feedback for a fixed probability of error and secrecy parameter. As a corollary, we obtain a strong converse for the capacity of a degraded wiretap channel with public ...
Hayashi, Masahito   +2 more
core   +1 more source

Polar coding for the general wiretap channel [PDF]

open access: yes2015 IEEE Information Theory Workshop (ITW), 2015
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic security is an important problem. By applying the two recently developed techniques for polar codes, we propose a polar coding scheme to achieve the secrecy capacity of the general wiretap channel.
Yi-Peng Wei, Sennur Ulukus
openaire   +2 more sources

Polar Coding for Confidential Broadcasting

open access: yesEntropy, 2020
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to send the same private (non-confidential) message and the same confidential ...
Jaume del Olmo Alòs   +1 more
doaj   +1 more source

Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

open access: yes, 2014
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core   +1 more source

Home - About - Disclaimer - Privacy