نتایج جستجو برای: secrecy capacity

تعداد نتایج: 282274  

Journal: :CoRR 2009
Li-Chia Choo Kai-Kit Wong

In this paper, we study the secrecy capacity region for the 3-receiver broadcast channel (BC) with degraded message sets, where a confidential message is kept secret from one of the receivers. This model is more general than the previously studied degraded broadcast channel (BC) with confidential messages, as the wiretap receiver is supposed to receive the common message. Our main results are t...

2015
Lifeng Wang

Security and privacy have become increasingly significant concerns in wireless communication networks, due to the open nature of the wireless medium which makes the wireless transmission vulnerable to eavesdropping and inimical attacking. The emergence and development of decentralized and ad-hoc wireless networks pose great challenges to the implementation of higher-layer key distribution and m...

Journal: :IEEE Access 2022

Currently, the physical layer security is considered as one of most suitable techniques in Diffusive Molecular Communication (DMC) because ease to implement. A recent piece literature has presented Secrecy Capacity (SC) DMC system under rectangular deployment. To evaluate information capacity (IC) and thereby SC using Concentration Greens Function (CGF) molecular communication depends on biolog...

2010
Sirin Nitinawarat

Title of dissertation: INFORMATION THEORETIC SECRET KEY GENERATION: STRUCTURED CODES AND TREE PACKING Sirin Nitinawarat, Doctor of Philosophy, 2010 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering Institute for Systems Research This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals wi...

Journal: :IEEE Transactions on Information Theory 2015

Journal: :The Journal of Korea Information and Communications Society 2014

2009
Theofilos Chrysikos Tasos Dagiuklas Stavros A. Kotsopoulos

This paper provides a closed-form expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security. This is accomplished on the basis of an approximation of the exponential function via a first-order Taylor series. The error of this method is calculated for two different channel cases, and the resulting precision confirms the correctness of this approach. Thus, the Outage Secre...

2014
O. Ozan Koyluoglu Yanling Chen Aydin Sezgin

In this paper, we study the problem of secure communication over the broadcast channel with receiver side information, under the lens of individual secrecy constraints (i.e., information leakage from each message to an eavesdropper is made vanishing). Several coding schemes are proposed by extending known results in broadcast channels to this secrecy setting. In particular, individual secrecy p...

Journal: :Foundations and Trends in Communications and Information Theory 2016
Prakash Narayan Himanshu Tyagi

This monograph describes principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper’s observation of the communication. Part I develops basic technical tools for secrecy generation, many of which are potentially of independent interest...

2008
Amin Aminzadeh Gohari Venkat Anantharam

This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source model. In the source model the terminals wishing to generate a secret key, as well as the eavesdropper, receive the respective coordinates of a block of independent and identically distributed copies of jointly distribute...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید