نتایج جستجو برای: achievable secrecy rate region

تعداد نتایج: 1470136  

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Yingbin Liang Gerhard Kramer H. Vincent Poor Shlomo Shamai

This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is kept in full ignorance about the message. The compound wiretap channel...

Journal: :Entropy 2017
Andrea Grigorescu Holger Boche Rafael F. Schaefer

Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes. It is shown that authentication is robust against source uncertainty and a special class of attacks under the strong secrecy condition. A single-letter characteri...

Journal: :CoRR 2011
Stefano Rini

Random coding, along with various standard techniques such as coded time-sharing, rate-splitting, superposition coding, and binning, are traditionally used in obtaining achievable rate regions for multi-terminal networks. The error analysis of such an achievable scheme relies heavily on the properties of strongly joint typical sequences and on bounds of the cardinality of typical sets. In this ...

Journal: :CoRR 2016
X. Luo Rodrigo C. de Lamare

In this paper, we investigate an opportunistic relay and jammer scheme along with relay selection algorithms based on the secrecy rate criterion in multiple-input multiple-output buffer-aided down link relay networks, which consist of one source, a number of relay nodes, legitimate users and eavesdroppers, with the constraints of physical layer security. The opportunistic relay and jammer schem...

Journal: :IEEE Trans. Information Theory 2003
Prashant Koulgi Ertem Tuncel Shankar L. Regunathan Kenneth Rose

The problem of separate zero-error coding of correlated sources is considered. Inner and outer single-letter bounds are established for the achievable rate region, and conditions for their coincidence are investigated. It is shown that successive encoding combined with time sharing is not always an optimal coding strategy. Conditions for its optimality are derived. The inner bound to the achiev...

2006
Bin Dai Yuan Luo

The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...

2014
Maksym Girnyk

MULTIPLE antennas at each side of the communication channel seem to be vital for future wireless communication systems. Multi-antenna communication provides throughput gains roughly proportional to the smallest number of antennas at the communicating terminals. On the other hand, multiple antennas at a terminal inevitably increase the hardware complexity of the latter. For efficient design of s...

Journal: :IEEE Journal of Selected Topics in Signal Processing 2016

Journal: :IEEE Transactions on Aerospace and Electronic Systems 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید