نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

Journal: :CoRR 2007
Ruoheng Liu H. Vincent Poor

In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users wit...

Journal: :Entropy 2017
Andrea Grigorescu Holger Boche Rafael F. Schaefer

Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes. It is shown that authentication is robust against source uncertainty and a special class of attacks under the strong secrecy condition. A single-letter characteri...

Journal: :Journal of experimental psychology. General 2015
Michael L Slepian Nicholas P Camp E J Masicampo

Recent work suggests that secrecy is perceived as burdensome. A secrecy-burden relationship would have a number of consequences for cognitive, perceptual, social, and health psychology, but the reliability of these influences, and potential mechanisms that support such influences are unknown. Across 4 studies, the current work examines both the reliability of, and mechanisms that support, the i...

2012
Mohammad Rakibul Islam

In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input m...

2013
Maksym A. Girnyk Frederic Gabry Mikko Vehkaperä Lars K. Rasmussen Mikael Skoglund

With the growth of wireless networks, security has become a fundamental issue in wireless communications due to the broadcast nature of these networks. In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate. Unfortunately, the direct solution to finding ergodic secrecy rates is prohibitive...

Journal: :Ad Hoc Networks 2014
Jinxiao Zhu Yin Chen Yulong Shen Osamu Takahashi Xiaohong Jiang Norio Shiratori

This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect the received signals. For the random networks where the legitimate nodes and the eavesdroppers are distributed as Poisson point processes, we study the secrecy transmission capacity (STC), as well as the connection o...

2016
Michael Backes Peeter Laud

We present a novel approach for proving secrecy properties of security protocols by mechanized flow analysis. In contrast to existing tools for proving secrecy by abstract interpretation, our tool enjoys cryptographic soundness in the strong sense of blackbox reactive simulatability/UC which entails that secrecy properties proven by our tool are automatically guaranteed to hold for secure crypt...

2004
Roberto Giacobazzi Isabella Mastroeni

In this paper we introduce a compositional proof-system for certifying abstract non-interference in programming languages. Certifying abstract noninterference means proving that no unauthorized flow of information is observable by the attacker from confidential to public data. The properties of the computation that an attacker may observe are specified as an abstract domain. Assertions specify ...

2013
Jochen Sommerfeld

We consider two communication systems which are time-discrete and memoryless, both depend on a state, in terms of information-theoretic secure data transmission. The compound channel consists of a finite or infinite set of channels which is known to both the sender and the receiver, but unfortunately it is not known which channel is in use for any codeword transmission. In contrast the state of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید