Results 61 to 70 of about 6,771 (265)
An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (AD), (b) reconciliation, and (c) privacy amplification.
Yan Feng +4 more
doaj +1 more source
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed.
Goldfeld, Ziv, Permuter, Haim. H.
core +1 more source
The Gaussian wiretap channel with a helping interferer [PDF]
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11 ...
Xiaojun Tang 0001 +3 more
openaire +2 more sources
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
Optimization of Code Rates in SISOME Wiretap Channels
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni +4 more
core +1 more source
Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende +26 more
wiley +1 more source
Computational wiretap coding: framework and practical construction
Wiretap coding, evolving in parallel with cryptography for nearly 50 years, focuses on secure transmission under the assumption that the wiretap channel is no less noisy than the main channel.
Mengjie Huang +5 more
doaj +1 more source
Information-theoretic Physical Layer Security for Satellite Channels
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has access to an identical copy of the cyphertext that Alice sends to Bob. Shannon defined perfect secrecy to be the case when the mutual information between the plaintext and the ...
Hayashi, Masahito +1 more
core +1 more source
This study demonstrates an efficient recycling route for out‐of‐spec AlSi10Mg atomized powders through compaction and arc remelting followed by suction casting. By correlating compaction load, cooling rate, and resulting microstructure, we show that intermediate pressures (50–80 kN) and rapid cooling refine dendrites, reduce porosity, and enhance ...
Mila Christy de Oliveira +4 more
wiley +1 more source
Energy Efficient Secure Communication Model against Cooperative Eavesdropper
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers.
Akashkumar Rajaram +3 more
doaj +1 more source

