… input constraints and designing secure transmission schemes under this … physicallayer security. With this motivation, this paper reviews recent developments on physicallayersecurity …
B Li, Z Fei, C Zhou, Y Zhang - IEEE Internet of things journal, 2019 - ieeexplore.ieee.org
… Guo, “Physicallayersecure transmission based on fast dual polarization hopping in fixed … Zhou, “Polarization filtering based physicallayersecure transmission scheme for dual-…
… His research interests are in the areas of informationtheory, error-control coding, wireless communications, and cryptography. He is a member of the IEEE and has served on the …
… In contrast with the established practice of computational security, many results from informationtheory, signal processing, and cryptography suggest that there is much …
H Wang, X Zhou, MC Reed - IEEE Transactions on Wireless …, 2013 - ieeexplore.ieee.org
… In contrast, the concept of achieving informationtheoretic security by protecting the physical layer of wireless networks has attracted attention widely in the research community. Wyner …
… In this section, we present a case study to show the physicallayersecurity improvement by exploiting cooperative relays, where only a single best relay is selected to assist the signal …
… Recently, physicallayersecurity has become an emerging research front which provides … The theoretical basis of physicallayersecurity approaches is dated back to informationtheory, …
… , we introduce an information-theoretic definition of the secure communication graph (s-graph)… Csiszar, “Common randomness in informationtheory and cryptography. I. Secret sharing,” …
M Mitev, TM Pham, A Chorti… - … Information Theory …, 2023 - ieeexplore.ieee.org
… journey of physicallayersecurity (PLS), starting from its theoretical … physical unclonable functions (PUFs), localization and RF fingerprinting. Since the middle of last century the theory …