نتایج جستجو برای: achievable secrecy rate region
تعداد نتایج: 1470136 فیلتر نتایج به سال:
The coding problem for wiretap channels with causal channel state information available at the encoder and/or the decoder is studied under the strong secrecy criterion. This problem consists of two aspects: one is due to naive wiretap channel coding and the other is due to one-time pad cipher based on the secret key agreement between Alice and Bob using the channel state information. These two ...
Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured codes are useful for providing secrecy, and show how to compute the secrecy rate when structured c...
In this dissertation we try to achieve secrecy enhancement in communications by resorting to both cryptographic and information theoretic secrecy tools and metrics. Our objective is to unify tools and measures from cryptography community with techniques and metrics from information theory community that are utilized to provide privacy and confidentiality in communication systems. For this purpo...
Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...
When simultaneous wireless information and power transfer is carried out, a fundamental tradeoff between achievable rate and harvested energy exists because the received power is used for two different purposes. The tradeoff is well characterized by the rate-energy region, and several techniques have been proposed to improve the achievable rate-energy region. However, the existing techniques st...
We consider the secure transmission of information over power line communication (PLC) networks. The focus is on the secrecy guaranteed at the physical layer, named physical layer security (PLS). Although PLS has been deeply investigated for the wireless case, it is not the same for the PLC environment. Thus, starting from the knowledge in the wireless context, we extend the results to typical ...
The fundamental limits of biometric identification systems under a strong secrecy criterion are investigated. In the previous studies this scenario, trade-off among secrecy, template, privacy- and secrecy-leakages has been revealed in case where there is only one user, while multiple users not discussed yet. study, we consider system with exponentially many users, characterize capacity region r...
A recent result for the general interference channel is presented. The encoding technique is a generalization of the technique employed by Han and Kobayashi. Coupled with an improvement in the computation of the error probabilities, fewer constraints are necessary to define the achievable rate region. We further compare the two achievable rate regions and discuss whether the two achievable rate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید