نتایج جستجو برای: secrecy
تعداد نتایج: 5023 فیلتر نتایج به سال:
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
In this paper, the individual secrecy of two-way wiretap channel is investigated, where two legitimate users’ messages are separately guaranteed secure against an external eavesdropper. For one thing, in some communication scenarios, the joint secrecy is impossible to achieve both positive secrecy rates of two users. For another, the individual secrecy satisfies the secrecy demand of many pract...
Let S = 〈L, S〉 be a deductive system. An S -secrecy logic is a quadruple K = 〈FmL(V ),K,B, S〉 , where FmL(V ) is the algebra of L-formulas, K,B are S -theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅ . K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of s...
In this paper, the one-sided secrecy of two-way wiretap channel with feedback is investigated, where the confidential messages of one user through multiple transmissions is guaranteed secure against an external eavesdropper. For one thing, one-sided secrecy satisfies the secure demand of many practical scenarios. For another, the secrecy is measured over many blocks since the correlation betwee...
We study the effect of pricing on the secrecy capacity of multi-terminal networks. We propose a linear and a non-linear pricing function for user terminals and present mathematical formulations to maximize the individual secrecy capacity of each transmitter-receiver pair as well as the sum secrecy capacity of the system. We show that these pricing models result in better energy efficiency and a...
A b s t r a c t. In recent work the notion of a secrecy logicS over a given deductive system S was introduced. Secrecy logics capture the essential features of structures that are used in performing secrecy-preserving reasoning in practical applications. More precisely, they model knowledge bases that consist of information, part of which is considered known to the user and part of which is to ...
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...
OBJECTIVES This study examined (a) associations of parent-adolescent relationship characteristics and adolescent problem behavior with late adolescents' secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. METHODS Adolescents (N = 247, Mage = 17.76 years) completed survey measures...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید