نتایج جستجو برای: perfect secrecy
تعداد نتایج: 50745 فیلتر نتایج به سال:
We study the effect of pricing on the secrecy capacity of multi-terminal networks. We propose a linear and a non-linear pricing function for user terminals and present mathematical formulations to maximize the individual secrecy capacity of each transmitter-receiver pair as well as the sum secrecy capacity of the system. We show that these pricing models result in better energy efficiency and a...
The technique of group secret handshake (GSH) has been used to help the members affiliated with same in achieving private authentication. After executing GSH protocols, participants can compute a shared key, or generate public encryption key while true self-compute their decryption keys. This paper presents concrete protocol Multiple Groups. Only legitimate member prove that it belongs set affi...
Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investiga...
In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finitealphabet input in the presence of an user and J non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code ...
A b s t r a c t. In recent work the notion of a secrecy logicS over a given deductive system S was introduced. Secrecy logics capture the essential features of structures that are used in performing secrecy-preserving reasoning in practical applications. More precisely, they model knowledge bases that consist of information, part of which is considered known to the user and part of which is to ...
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...
OBJECTIVES This study examined (a) associations of parent-adolescent relationship characteristics and adolescent problem behavior with late adolescents' secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. METHODS Adolescents (N = 247, Mage = 17.76 years) completed survey measures...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this paper, the performance of secrecy, offered by multihop decode-and-forward relaying, is investigated and compared to its counterpart in direct transmission. Three key performance measures are derived over Rayleigh fading channels: probability of non-zero secrecy capacity, secure outage probability a...
In this paper, the information-theoretic secrecy for the log-normal fading channel is investigated. In particular, the closed-form expressions of the probability of strictly positive secrecy capacity are derived for two wireless communication systems, with single eavesdropper and double eavesdroppers, respectively. Keywords-Information-theoretic secrecy, log-normal fading, secrecy capacity.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید