نتایج جستجو برای: secrecy capacity
تعداد نتایج: 282274 فیلتر نتایج به سال:
Motivated by the two-user beamforming in multiantenna interference channels, we characterize the upper boundary of the achievable single-user gain-region. The eigenvector corresponding to the maximum eigenvalue of the weighted sum of Hermitian forms of channel vectors is shown to achieve all points on the boundary in some given direction. Thereby, we solve three different beamforming problems, ...
In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to adversary is noisier than the one from sender to receiver. The secrecy capacity is the optimal (highest possible) rate of a secure scheme, and the existence of schemes achieving it has been shown. For thirty years the ultimate and unreac...
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...
Title of dissertation: ALIGNMENT AND COOPERATION FOR SECRECY IN MULTI-USER CHANNELS Raef Bassily Doctor of Philosophy, 2011 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical and Computer Engineering The study of the physical layer has offered a new perspective to the problem of communication security. This led to the development of a vast set of ideas and techniques roo...
This paper studies the information theoretic secrecy sum-rate for multi-user multiple-input single-output (MU-MISO) visible light communication (VLC) systems with confidential messages. The well-known Zero-Forcing (ZF) precoding method is employed to ensure confidentiality among legitimate users and, at the same time, to prevent eavesdropper(s) from obtaining any information. Different from rad...
Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...
The fading channel model is seen as an important approach that can efficiently capture the basic time-varying properties of wireless channels, while physical layer security is a promising approach to providing a strong form of security. This paper focuses on the fundamental performance study of applying physical layer security to achieve secure and reliable information transmission over the fad...
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation ra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید