P Wang, R Safavi-Naini - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
In the (ρ r, ρ w)-adversarial wiretap (AWTP) channel model of [13], a codeword sent over the communication channel is corrupted by an adversary who observes a fraction ρ r of the …
In a point-to-point communication system, which consists of a sender, a receiver, and a set of noiseless channels, the sender wishes to transmit a private message to the receiver through …
This paper investigates the maximal secret communication rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and …
M Nafea, A Yener - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
In this paper, a new wiretap channel model is proposed, where the legitimate transmitter and receiver communicate over a discrete memoryless channel. The wiretapper has perfect …
S Kamel, M Sarkiss, M Wigger… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers …
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based …
H Tyagi, A Vardy - 2014 IEEE International Symposium on …, 2014 - ieeexplore.ieee.org
We extend the Bellare-Tessaro coding scheme for a discrete, degraded, symmetric wiretap channel to a Gaussian wiretap channel. Denoting by SNR the signal-to-noise ratio of the …
A Wickramasooriya, I Land… - SCC 2013; 9th …, 2013 - ieeexplore.ieee.org
This paper addresses the analysis of binary linear codes for the wiretap channel with focus on binary erasure channels. We use a novel approach to measure the equivocation rate by …
We study the frequency-selective broadcast channel with confidential messages (BCC) where the transmitter sends a confidential message to receiver 1 and a common message to …