过去一年中添加的文章,按日期排序

Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC

AN Nguyen, TS Ngo, NA Bui, PC Le… - EAI Endorsed …, 2024 - publications.eai.eu
3 天前 - … In this paper, we investigate a secure offloading model for a NOMA-based UAV-aided
MEC in … physical layer security for NOMA transmission in mmwave drone networks. In …

Physical-layer secret key generation for dual-task scenarios

Y Lilin, L Guyue, G Tao, X Hao… - China …, 2024 - ieeexplore.ieee.org
4 天前 - Physical-layer secret key generation (PSKG) provides a lightweight way for group
key (GK) sharing between wireless users in large-scale wireless networks. … a security issue …

ASSESSING THE FEASIBILITY OF CRITICAL SYSTEMS WITH OPEN-SOURCE RESOURCES: AN EDUCATIONAL EXPLORATION WITH A LOGISTICS USE CASE

G Gialelis - EDULEARN24 Proceedings, 2024 - library.iated.org
5 天前 - … It comes with integrated Wi-Fi connectivity through the u-blox NINAW10 module,
facilitating wireless network and internet connections. Operating at 3.3V, this board is …

ChaQra: a cellular unit of the Indian quantum network

S Gupta, I Agarwal, V Mogiligidda… - Scientific Reports, 2024 - nature.com
6 天前 - … Fully connected quantum networks: It is based on high dimensional or … secure keys
between any or all the users in the network 38,39 . Most of the field trials or quantum network

Security Threats Countered with Root-of-Trust Methodology

D Moriyama - ATZelectronics worldwide, 2024 - Springer
7 天前 - … Especially, if such a command from the wireless network is accepted, the vehicle
can … as IT or mobile. This article has provided some examples of previous security concerns in …

Legoga: centering motherhood as an informant for design

L Mabudusha - ujcontent.uj.ac.za
7 天前 - IV The mandate that comes with a contemporary clinic completely ignores the natural
abilities of a woman’s body to deliver a child as expressed by Dr Grantly Dick-Read in his …

Performance Analysis and Low-Complexity Beamforming Design for Near-Field Physical Layer Security

Y Zhang, Y Fang, X Yu, C You, YJA Zhang - arXiv preprint arXiv …, 2024 - arxiv.org
7 天前 - … Abstract—Extremely large-scale arrays (XL-arrays) have emerged as a key enabler
in achieving the unprecedented performance requirements of future wireless networks, …

9 A Survey on Issues in Integrating Blockchain and IoT Technologies

BB Pannyagol, SL Deshpande - Blockchain for IoT Systems …, 2024 - books.google.com
7 天前 - … 2.2 Network Layer Between the physical layer and the application layer, this layer
… It consists of gateway, network protocol, and connecting technologies. The gadgets are …

Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform

M Mohammed, X Peng, Z Chai, M Li, R Abayneh… - … Networks, 2024 - Springer
8 天前 - wireless communication, radio-frequency (RF) fingerprints, rooted in physical-layer
security, are … for enhancing the physical-layer security for the future wireless communication. …

Joint Secure Beamforming and Power Splitting Design for MIMO Relay Assisted Over-the-Air Computation Networks With Imperfect CSI

H Luo, Q Li, Q Zhang - … on Information Forensics and Security, 2024 - ieeexplore.ieee.org
8 天前 - … a physical layer security issue in a multiple-input multiple-output (MIMO) relay
assisted over-the-air computation (AirComp) network, … Specifically, we investigate a joint secure