نتایج جستجو برای: secrecy
تعداد نتایج: 5023 فیلتر نتایج به سال:
The MIMOME channel is a Gaussian wiretap channel in which the sender, receiver, and eavesdropper all have multiple antennas. We characterize the secrecy capacity as the saddle-value of a minimax problem. Among other implications, our result establishes that a Gaussian distribution maximizes the secrecy capacity characterization of Csiszár and Körner when applied to the MIMOME channel. We also d...
Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message con dentiality even long-term private key compromised. We present an e¢ cient construction of multi message multi receiver signcryption with forward secrecy on elliptic curves. It provides con dentiality, integrity, authenticity, non-repudiation, public ve...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it...
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
This article contributes to ongoing attempts broaden out theorizations of secrecy from an intentional and willful act concealment a cultural structural process. We do so by fostering conversation between curiosity. is enabled through review central themes in studies curiosity studies, but also examination collaboration the science center “We Curious” network academic researchers. In doing so, t...
While participating in a symposium on Dave Ripley’s forthcoming book Uncut, I had proposed that employing strict-tolerant interpretation of the weak Kleene matrices provided content-theoretical conception bounds conversational norms enjoyed advantages over use strong matrices. During discussion, used case sentences are taken to be out-of-bounds for being secrets as an example which setting prac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید