Filters








10,270 Hits in 5.7 sec

Towards Optimal and Efficient Perfectly Secure Message Transmission [chapter]

Matthias Fitzi, Matthew Franklin, Juan Garay, S. Harsha Vardhan
<i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/stkrz63uergo3ioytg4qxvro3m" style="color: black;">Theory of Cryptography</a> </i> &nbsp;
Perfectly secure message transmission (PSMT), a problem formulated by Dolev, Dwork, Waarts and Yung, involves a sender S and a recipient R who are connected by n synchronous channels of which up to t may  ...  The goal is to transmit, with perfect security, a message from S to R. PSMT is achievable if and only if n > 2t.  ...  The work of Matthias Fitzi and Matt Franklin was partly supported by a David and Lucile Packard Fellowship for Science and Engineering.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-70936-7_17">doi:10.1007/978-3-540-70936-7_17</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/tcc/FitziFGV07.html">dblp:conf/tcc/FitziFGV07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n7lztd4kgbehjgpaacgs43tqsu">fatcat:n7lztd4kgbehjgpaacgs43tqsu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170822181816/https://link.springer.com/content/pdf/10.1007%2F978-3-540-70936-7_17.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f5/36/f536ce4dcd7da8aa5f54407c9e4ba73ccff51d7f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-70936-7_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Complexity of Network Design for Private Communication and the P-vs-NP Question

Stefan Rass
<span title="">2014</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
Based on a game-theoretic privacy measure, we consider two optimization problems related to secure infrastructure design with constraints on computational efforts and limited budget to build a transmission  ...  Even worse, if we measure (quantify) secrecy by the probability of information-leakage, we can prove that approximations of a network design towards maximal security are computationally equivalent to the  ...  Any (0, 0)-secure protocol is called perfectly secure, and a communication having this performance guarantee is called perfectly secure message transmission (PSMT).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2014.050222">doi:10.14569/ijacsa.2014.050222</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6hb5aitrvcv5ejebjnkayfl7a">fatcat:n6hb5aitrvcv5ejebjnkayfl7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706062557/http://thesai.org/Downloads/Volume5No2/Paper_22-Complexity_of_Network_Design_for_Private.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/8e/c18e750c228353c310aa0f818949ea7bfc220089.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2014.050222"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Physical Layer Service Integration in 5G: Potentials and Challenges [article]

Weidong Mei, Zhi Chen, Jun Fang, Shaoqian Li
<span title="2018-02-10">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems.  ...  ., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models.  ...  and kept perfectly secure from receiver 2.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1707.01064v2">arXiv:1707.01064v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nzm2v335ebb3bkwcdqhntizype">fatcat:nzm2v335ebb3bkwcdqhntizype</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200908035750/https://arxiv.org/pdf/1707.01064v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/7e/787e8f36e341a4097166648a3a1c525d08ae7dd8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1707.01064v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Security as a Game – Decisions from Incomplete Models [chapter]

Stefan Rass, Peter Schartner, Raphael Wigoutschnigg
<span title="2010-01-01">2010</span> <i title="InTech"> Decision Support Systems </i> &nbsp;
Referring to these notions, a network permits perfectly secure message delivery from s to r if and only if the graph G is A (2) (s,r)-subconnected.  ...  in a real-life network: if for u ≥ 1, 3(k − u) + 1 ≥ k + 1 directed node-disjoint paths from s to r exist, then a necessary condition for perfectly secure message transmission from s to r against a k-active  ...  perfectly secure message transmission is possible under a few assumptions: 1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/39453">doi:10.5772/39453</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tl5kbi5cpjekjktqzpignb4wxm">fatcat:tl5kbi5cpjekjktqzpignb4wxm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504124241/https://cdn.intechopen.com/pdfs/6879.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/85/5f85ec09c4d959434622ccd652e92728756cc77b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/39453"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Towards Multi-Functional 6G Wireless Networks: Integrating Sensing, Communication and Security [article]

Zhongxiang Wei, Fan Liu, Christos Masouros, Nanchi Su, Athina P. Petropulu
<span title="2021-07-16">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Then, we detail the challenges and contradictory objectives involved in securing ISAC transmission, along with state-of-the-art approaches to address them.  ...  At the same time, the sensing capability incorporated in the ISAC transmission offers unique opportunities to design secure ISAC techniques.  ...  Hardware Efficient Secure ISAC Design In real scenarios, hardware limitations may jeopardize the sensing and communication performance, and importantly the security of the transmission.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.07735v1">arXiv:2107.07735v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dti6dphex5do5oceifgimemqry">fatcat:dti6dphex5do5oceifgimemqry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210721015134/https://arxiv.org/pdf/2107.07735v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/97/48978fc0fbb948ee86249a75a2f02094987f6194.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.07735v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Optimal Perfectly Secure Message Transmission [chapter]

K. Srinathan, Arvind Narayanan, C. Pandu Rangan
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way  ...  We prove that any 2-phase reliable message transmission protocol, and hence any secure protocol, over n wires out of which at most t are faulty is required to transmit at least b = n n−2t n n−2t bits irrespective  ...  This problem, known as perfectly secure message transmission (PSMT), was first proposed and solved by Dolev et al. [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-28628-8_33">doi:10.1007/978-3-540-28628-8_33</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wwshpczuh5b3tiigwds3kpeb6q">fatcat:wwshpczuh5b3tiigwds3kpeb6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130701073721/http://link.springer.com:80/content/pdf/10.1007%2F978-3-540-28628-8_33.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cf/de/cfde41a08f8ba51d96576bd7aa700c9d946b9eb3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-28628-8_33"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SARDS: Secured Anonymous Routing with Digital Signature in Wireless Sensor Network

H. R. Roopashree, Anita Kanavalli
<span title="2016-02-02">2016</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
A Wireless Sensor Network has witnessed a massive research towards security as well as energy efficiency in past decades.  ...  The outcome of the study shows SARDS to excel best in performance in comparison of existing security and energy efficient routing schemes.  ...  However, routing-based security techniques allows authentication scheme in efficient way but posses significant transmission delay.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i7/85760">doi:10.17485/ijst/2016/v9i7/85760</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oudxtwszafd6dbcq4u7ora6m6a">fatcat:oudxtwszafd6dbcq4u7ora6m6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720071255/http://www.indjst.org/index.php/indjst/article/download/85760/67600" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i7/85760"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Mobile Node Dynamism using Particle Swarm Optimization to fight against Vulnerability Exploitations

Subburaj.V Subburaj.V, K. Chitra
<span title="2012-03-31">2012</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
In this way of classifying nodes based on its arrangement, each and every node depends upon other nodes for packet transmission and acknowledgement.  ...  The need for node dynamism also ensures node efficient performance measures using rule based detection of individual node.  ...  The implication of the PSO also provides good alarm rates in terms of efficient optimization towards security. The impact of black hole attack makes the node inaccessible.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/5598-7850">doi:10.5120/5598-7850</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6iplzzzpjdp7cthzz6q6oesi4">fatcat:n6iplzzzpjdp7cthzz6q6oesi4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170814083751/http://research.ijcaonline.org/volume41/number13/pxc3877850.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/73/b8731ea0365ea318445e9849c39bcb06eb432e5a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/5598-7850"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Approximation Hardness and Secure Communication in Broadcast Channels [chapter]

Yvo Desmedt, Yongge Wang
<span title="">1999</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Franklin and Wright, and Wang and Desmedt have shown that if there are at most k malicious (Byzantine style) processors, then there is an efficient protocol for achieving probabilisticly reliable and perfectly  ...  Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have initiated the study of secure communication and secure computation in multi-recipient (broadcast) models.  ...  A message transmission protocol is perfectly private if it is 0-private. 4. A message transmission protocol is (ε, δ)-secure if it is ε-private and δreliable. 5.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-48000-6_20">doi:10.1007/978-3-540-48000-6_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dvqr64j3wjdmnbvlzyblhw3nlu">fatcat:dvqr64j3wjdmnbvlzyblhw3nlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060905182920/http://www.sis.uncc.edu/~yonwang/papers/acrypt992.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a2/9f/a29fdf8f2afc6f10be4373186f61c20d7f02a5a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-48000-6_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Image Steganography using Particle Swarm Optimization and Transform Domain

Sanjutha MK
<span title="2018-04-25">2018</span> <i title="Science Publishing Corporation"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/piy2nrvrjrfcfoz5nmre6zwa4i" style="color: black;">International Journal of Engineering &amp; Technology</a> </i> &nbsp;
The main aim of the proposed paper is to make better security and to obtain efficient PSNR and MSE values  ...  Here in this paper, a secure, optimized scheme called particle swarm optimization is used to select the pixel efficiently for embedding the secret image in to cover image.  ...  and finally in the third layer inverted LSB technique is used [7] .To provide an efficient and novel technique for image steganography that makes secret transmission efficient using adaptive circular  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.24.12139">doi:10.14419/ijet.v7i2.24.12139</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vof4zxb6e5a5vhz6s4jfrhj7ii">fatcat:vof4zxb6e5a5vhz6s4jfrhj7ii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721020926/https://www.sciencepubco.com/index.php/ijet/article/download/12139/4817" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/b2/13b2d7999f26a5fd075f34bc6c7d7049dd02b434.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.24.12139"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

On the Practical Feasibility of Secure Multipath Communication

Stefan Rass, Benjamin Rainer, Stefan Schauer
<span title="">2013</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.  ...  In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication.  ...  ACKNOWLEDGMENT This work has been supported by the Austrian Research Promotion Agency, under research grants no. 836287 and 829570.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.041016">doi:10.14569/ijacsa.2013.041016</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cylxznvygvf77f2z33k4myv3ey">fatcat:cylxznvygvf77f2z33k4myv3ey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706060848/http://thesai.org/Downloads/Volume4No10/Paper_16-On_the_Practical_Feasibility_of_Secure_Multipath_Communication.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/bf/aabf082d5639d8cb0dcf476ac09037e829550aff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.041016"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Robust Modelling to Jointly Address Security Threats, Bandwidth Utilization, and Energy issues in IoT

<span title="2019-12-10">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
The simulation outcome of the study shows that proposed system offers better energy efficiency, better resistivity against threats, and effective optimization of the bandwidth in contrast to existing related  ...  mechanism towards IoT ecosystem.  ...  achieveing security and energy efficiency and ii) the second implementation level will be towards achieving bandwidth optimization and energy efficiency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6432.129219">doi:10.35940/ijitee.b6432.129219</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qndcgetm5rhypmkih2gvzmasca">fatcat:qndcgetm5rhypmkih2gvzmasca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220224142043/https://www.ijitee.org/wp-content/uploads/papers/v9i2/B6432129219.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/30/d1/30d1fda889dabba1c644518b5a732c5f1b769f7a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b6432.129219"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
<span title="2019-01-23">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
, secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization.  ...  designs from the viewpoints of optimization and signal processing.  ...  reliably (i.e., the message cannot be decoded correctly by intended receivers) or the message transmission is not perfectly secure (i.e., some information may leak to eavesdroppers) [160] , [161] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1901.07955v1">arXiv:1901.07955v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3pb27rlc45c3dmnjgwmjyspvb4">fatcat:3pb27rlc45c3dmnjgwmjyspvb4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191012204828/https://arxiv.org/pdf/1901.07955v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8b/01/8b0150893ff6c855f1a90685fb9842d999b5ae88.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1901.07955v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things

Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Naveed Islam, Ayman Altameem
<span title="2020-04-27">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security.  ...  It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission  ...  Accordingly, due to the randomness of secret keys, the computed OTP requires the least workout and perfectly secures data transmissions against mischievous entities.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20092468">doi:10.3390/s20092468</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32349237">pmid:32349237</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7ibve34rujh2ra63wxuqhj2pti">fatcat:7ibve34rujh2ra63wxuqhj2pti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200504081804/https://res.mdpi.com/d_attachment/sensors/sensors-20-02468/article_deploy/sensors-20-02468-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6e/b7/6eb71746dbe3f89e191a77e97dd3e4fdd58f52b4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20092468"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks

X. Zhou, R. K. Ganti, J. G. Andrews, A. Hjorungnes
<span title="">2011</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ra4txhbrwnbwzk3lwinyjovpbe" style="color: black;">IEEE Transactions on Wireless Communications</a> </i> &nbsp;
The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security.  ...  This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints.  ...  On the other hand, the confidential message transmission is not perfectly secure against the eavesdropper (at position) in Φ if log 2 (1 + SIR ) > , where SIR denotes the SIR at given by SIR = | | − ∑  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/twc.2011.061511.102257">doi:10.1109/twc.2011.061511.102257</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mzr7qebkyzcl7hpsaboj6hzelu">fatcat:mzr7qebkyzcl7hpsaboj6hzelu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130108032732/http://users.cecs.anu.edu.au/~xyzhou/papers/twc11c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/4f/a54fbf77e589f492a2891ed00138727477980284.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/twc.2011.061511.102257"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 10,270 results