نتایج جستجو برای: achievable secrecy rate region

تعداد نتایج: 1470136  

Journal: :CoRR 2010
Ghadamali Bagherikaram Abolfazl S. Motahari Amir K. Khandani

A K-user secure Gaussian Multiple-Access-Channel (MAC) with an external eavesdropper is considered in this paper. An achievable rate region is established for the secure discrete memoryless MAC. The secrecy sum capacity of the degraded Gaussian MIMO MAC is proven using Gaussian codebooks. For the non-degraded Gaussian MIMO MAC, an algorithm inspired by interference alignment technique is propos...

Journal: :CoRR 2018
Mohamed Seif Ravi Tandon Ming Li

In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). We propose a novel secure retrospective interference alignment scheme in which the transmitters carefully mix information symbols with artificial noises to ensure confidentiality. Achieving positive secure degrees of freedom (SDoF) is challenging d...

2012
Xiang He Ashish Khisti Aylin Yener

A two-transmitter Gaussian multiple access wiretap channel with multiple antennas at each of the nodes is investigated. The channel matrices at the legitimate terminals are fixed and revealed to all the terminals, whereas the channel matrix of the eavesdropper is arbitrarily varying and only known to the eavesdropper. The secrecy degrees of freedom (s.d.o.f.) region under a strong secrecy const...

Journal: :IEEE Transactions on Wireless Communications 2022

Wirelessly powered backscatter communications (WPBC) is an emerging technology for providing continuous energy and ultra-low power communications. Despite some progress in WPBC systems, resource allocation multiple devices towards secure (BC) efficient-energy harvesting (EH) requests a deep-insight investigation. In this paper, we consider system which full-duplex access point (AP) transmits mu...

Journal: :IEEE Trans. Information Theory 1981
Thomas M. Cover Cyril Leung

An achievable rate region R , G I( X, ; Y 1 X,, U), R 2 G 1(X2; YIX,, U), RI + R2 G 4x1, X2; Y), where P(U, xl, XZ, Y) = p(u)p(x,~u)p(x~~u)p(ylxl,x~), is established for the multiple-access channel with feedback. Time sharing of these achievable rates yields the rate region of this paper. This region generally exceeds the achievable rate region without feedback and exceeds the rate point found ...

2011
Zohaib Hassan Awan Abdellatif Zaidi Luc Vandendorpe

We study a special case of Willems’s two-user multiaccess channel with partially cooperating encoders from security perspective. This model differs from Willems’s setup in that only one encoder, Encoder 1, is allowed to conference, Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryle...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید