Diffusion-based molecular nanonetworks exploit the diffusion of molecules, eg, in free space or in blood vessels, for the purpose of communication. This article comprehensively surveys …
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure …
This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that …
The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Video streaming is one of the increasingly popular, as well as demanding, applications on smartphones today. In this paper, we consider a group of smartphone users, within proximity …
B Nazer, M Gastpar - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in …
The introduction of the Internet of Things (IoT) is creating manifold new services and opportunities. This new technological trend enables the connection of a massive number of …
Random access represents possibly the simplest and yet one of the best known approaches for sharing a channel among several users. Since their introduction in the 1970s, random …
Network coding and opportunistic routing are two recognized innovative ideas to improve the performance of wireless networks by utilizing the broadcast nature of the wireless …