نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

Journal: :IEEE Transactions on Information Theory 2018

2005
Avik Chaudhuri

We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...

M. M. Shahmoradian, M. Marcokova O. V. Chernoyarov Y. E. Korchagin

We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...

Journal: :International Journal 2021

This essay investigates justifications for the “necessity” of official secrecy, by tracing and structuring rationales underlying it. Justifications will be investigated through case “national security secrecy,” a prominent example secrecy. While literature generally treats secrecy” as unidimensional, this analysis demarcates several distinct rationales. Specifically, three national secrecy are ...

2016
Maoqiang Yang Bangning Zhang Yuzhen Huang Nan Yang Daoxing Guo Bin Gao

In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SS...

Journal: :CoRR 2016
Lei Yu Houqiang Li Weiping Li

This paper investigates joint source-channel secrecy for Gaussian broadcast communication in Shannon cipher system. We use a recently proposed secrecy measure, list secrecy, to measure secrecy, in which an eavesdropper is allowed to produce a list of reconstruction sequences and the secrecy is measured by the minimum distortion over the entire list. For achievability part, we propose a novel jo...

2007
Ruoheng Liu H. Vincent Poor

In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users wit...

2017
Zhong Zheng Zygmunt Haas Mario Kieburg

We propose and study the secrecy cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in presence of an eavesdropper with certain location constraint. The cooperative MIMO is formed by temporarily activating clusters of nearby trusted devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume...

Journal: :CoRR 2016
Xiaotao Lu Rodrigo C. de Lamare Keke Zu

In this paper, we propose novel non-linear precoders for the downlink of a multi-user MIMO system with the existence of multiple eavesdroppers. The proposed non-linear precoders are designed to improve the physical-layer secrecy rate. Specifically, we combine the non-linear successive optimization TomlinsonHarashima precoding (SO-THP) with generalized matrix inversion (GMI) technique to maximiz...

2010
Etienne Perron Suhas Diggavi

In this paper we summarize our recent work on information-theoretically secure wireless relay network communication. In such communication, the goal is to send information between two special nodes (“source” and “destination”) in a (memoryless) network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید