Intelligent and secure underwater acoustic communication networks

C Wang - 2018 - search.proquest.com
Underwater acoustic (UWA) communication networks are promising techniques for medium-
to long-range wireless information transfer in aquatic applications. The harsh and dynamic …

A security enhancement technique for wireless communications using secret sharing and physical layer secrecy transmission

S Yamasaki, TK Matsushima - IEICE TRANSACTIONS on …, 2016 - search.ieice.org
Secret sharing is a method of information protection for security. The information is divided
into n shares and reconstructed from any k shares, but no knowledge of the information is …

Improving secrecy capacity in successive relaying wireless networks with single and multi-layer transmissions

MAHA Abuyaghi - 2021 - dalspace.library.dal.ca
This thesis considers using physical layer security (PLS) in successive relaying networks
(SRN) where capacity of wireless channels are enhanced through simultaneous spectrum …

Wireless networks physical layer security: modeling and performance characterization

L Kong - 2019 - espace.etsmtl.ca
Intrigued by the rapid growth and expand of wireless devices, data security is increasingly
playing a significant role in our daily transactions and interactions with different entities …

Artificial-noise aided transmit design for outage constrained service integration

W Mei, L Li, Z Chen, C Huang - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper considers an artificial noise (AN)-aided transmit design for multi-user MISO
systems in the eyes of service integration. Specifically, we combine two sorts of services …

Secure resource allocation for the SISO‐OFDM wiretap channel

SM MirhoseiniNejad, V Tabataba Vakili… - IET …, 2017 - Wiley Online Library
The broadcast nature of communication systems opens the possibility for attackers to
eavesdrop the data and compromise data confidentiality. This study takes the information …

細胞邊界的干擾管理及自由度探討

馮懷彥 - 臺灣大學電信工程學研究所學位論文, 2015 - airitilibrary.com
我們考慮當用戶在蜂巢式系統邊界時, 要如何管理干擾訊號, 使整個蜂巢式系統的總自由度(Sum
Degrees of Freedom) 可以達到最大. 首先考慮的系統架構是兩個蜂巢式系統 …

Secure wireless communications using secret sharing and vector coding

S Yamasaki, TK Matsushima… - 2014 IEEE Asia Pacific …, 2014 - ieeexplore.ieee.org
A secret sharing is a method to protect the information for security. The information is divided
into n shares, and the information is reconstructed from any k shares but no knowledge of it …

Secure and Robust MIMO Transceiver for Multicast Mission Critical Communications

D Jagyasi, M Coupechoux - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
Mission-critical communications (MCC) involve all communications between people in
charge of the safety of the civil society. MCC have unique requirements that include …

Physical Layer Security in Multi-User Wireless Networks: Interference Effect on Large Scale Analysis

M Sadeghzadeh, M Salehi - 2020 IEEE 91st Vehicular …, 2020 - ieeexplore.ieee.org
We study the secrecy sum-rate (SSR) of a multi-user system in the presence of artificial
noise (AN) and determine conditions under which it is necessary to add AN assuming …