A secure communication scheme based generalized function projective synchronization of a new 5D hyperchaotic system

X Wu, Z Fu, J Kurths - Physica Scripta, 2015 - iopscience.iop.org
… increases the content and security of the transmitted information [31, … Liu and zhang [32]
proposed a secure communication scheme … In this work, a new secure communication scheme is …

Enhanced transmit antenna selection scheme for secure throughput maximization without CSI at the transmitter and its applications on smart grids

H Alves, M Tomé, PHJ Nardelli, CHM de Lima… - arXiv preprint arXiv …, 2015 - arxiv.org
… This paper addresses the establishment of secure communication links between smart-meters
(Alice) and an aggregator (Bob) in the presence of an eavesdropper (Eve). The proposed …

An improved secure communication scheme based passive synchronization of hyperchaotic complex nonlinear system

X Wu, C Zhu, H Kan - Applied Mathematics and Computation, 2015 - Elsevier
… In this paper, an improved secure communication scheme is proposed based on passive …
It is also shown that the presented secure communication scheme is robust against different …

A novel secure communication scheme based on the Karhunen–Loéve decomposition and the synchronization of hyperchaotic Lü systems

N Smaoui, M Zribi, T Elmokadem - Nonlinear Dynamics, 2017 - Springer
secure communication scheme, which is based on the Karhunen Loéve (K–L) decomposition
and the synchronization of hyperchaotic Lü systems. The scheme … image is selected; this …

Relay selection scheme for improving the physical layer security in cognitive radio networks

M Al-jamali, A Al-Nahari… - … and Communications …, 2015 - ieeexplore.ieee.org
security level of cognitive transmissions with a primary user quality of service (QoS) constraint.
The relay selection scheme … relay selection scheme to improve the physical-layer security

Speech authentication and content recovery scheme for security communication and storage

Q Qian, H Wang, X Sun, Y Cui, H Wang… - Telecommunication …, 2018 - Springer
… In the proposed scheme, the detail coefficients of IWT are selected to embed watermark.
As we known, the integer transform expands the difference between the selected detail …

A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference equations

S Papadimitriou, T Bountis, S Mavroudi… - International Journal of …, 2001 - World Scientific
… We present a new probabilistic symmetric key encryption scheme … We demonstrate that the
new algorithm is secure, reliable and … (b) Randomized selection of a state SVa from the set of …

User-pair selection in multiuser cooperative networks with an untrusted relay

B He, Q Ni, J Chen, L Yang, L Lv - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… We only focus on the secure communication at the untrusted relay node, and utilize the
proper selection scheme to enhance the security for the user-pair system. On the basis of (5), the …

Cooperative jamming secure scheme for iwns random mobile users aided by edge computing intelligent node selection

T Zhang, H Wen, J Tang, H Song… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… can resist eavesdropping attacks and enhance the security of a … selection scheme based
on ML. The edge computing device in the network performed the optimal CJ node selection. …

Secrecy outage analysis for cooperative NOMA systems with relay selection schemes

H Lei, Z Yang, KH Park, IS Ansari, Y Guo… - … on Communications, 2019 - ieeexplore.ieee.org
… To deal with the security issues followed by the explosive increase in cellular data, … layer
security (PLS) is emerging as one of the most promising ways to ensure secure communication