Secure Communication Under Channel Uncertainty and Adversarial Attacks
نویسندگان
چکیده
منابع مشابه
Communication Under Channel Uncertainty
In this lecture we study the problem of communication under channel uncertainty. The performance of the communication scheme, in addition to being governed by achieving the optimal rate, is characterized by a vanishing probability of decoding error. A universal decoder for a family of channels is a scheme which has no prior knowledge of the particular channel from this class over which transmis...
متن کاملReliable Communication Under Channel Uncertainty - Information Theory, IEEE Transactions on
In many communication situations, the transmitter and the receiver must be designed without a complete knowledge of the probability law governing the channel over which transmission takes place. Various models for such channels and their corresponding capacities are surveyed. Special emphasis is placed on the encoders and decoders which enable reliable communication over these channels.
متن کاملOn Shortest Random Walks under Adversarial Uncertainty
Finding shortest feasible paths in a weighted graph has numerous applications including admission and routing in communication networks. This paper discusses a game theoretic framework intended to incorporate a concept of path stability into the process of shortest path selection. Route stability is an important issue in a wire-line and especially in wireless network due to node mobility as wel...
متن کاملQoS routing under adversarial binary uncertainty
A cost based admission control and routing scheme admits an arriving request on the minimum cost route if this cost does not exceed the cost of the request, and rejects the request otherwise. Cost based strategies naturally arise as a result of optimization of the network performance or incorporating Quality of Service (QoS ) requirements into the admission and routing processes. In the former ...
متن کاملSecure Computation Under Network and Physical Attacks
Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the IEEE
سال: 2015
ISSN: 0018-9219,1558-2256
DOI: 10.1109/jproc.2015.2459652