Secrecy wireless information and power transfer with MISO beamforming

L Liu, R Zhang, KC Chua - IEEE Transactions on Signal …, 2014 - ieeexplore.ieee.org
The dual use of radio signal for simultaneous wireless information and power transfer
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …

Cyber security attacks on smart cities and associated mobile technologies

A AlDairi - Procedia computer science, 2017 - Elsevier
Smart City refer to the city that integrates modern technologies for automated and efficient
service providing to enhance citizens' lifestyle. Latest studies show that like 60 present of the …

Physical layer security of multiuser multirelay hybrid satellite-terrestrial relay networks

V Bankey, PK Upadhyay - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
In this paper, we study the physical layer security of a downlink hybrid satellite-terrestrial
relay network (HSTRN), where a multi-antenna satellite communicates with multiple …

Interference exploitation in D2D-enabled cellular networks: A secrecy perspective

C Ma, J Liu, X Tian, H Yu, Y Cui… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …

LTE/SAE security issues on 4G wireless networks

AN Bikos, N Sklavos - IEEE Security & Privacy, 2012 - ieeexplore.ieee.org
The authors give an overview on the state of the art of potential security issues that occur in
the deployment of the LTE/SAE (Long-Term Evolution/System Architecture Evolution) …

Cooperative jamming for wireless physical layer security

L Dong, Z Han, AP Petropulu… - 2009 IEEE/SP 15th …, 2009 - ieeexplore.ieee.org
Cooperative jamming is an approach that has been recently proposed for improving
physical layer based security for wireless networks in the presence of an eavesdropper …

Threshold visual secret sharing by random grids with improved contrast

T Guo, F Liu, CK Wu - Journal of Systems and Software, 2013 - Elsevier
A (k, n) visual cryptographic scheme (VCS) is a secret sharing method, which encodes a
secret image S into n share images in such a way that the stacking of any more than or …

Medical images transmission over wireless multimedia sensor networks with high data rate

H Kasban, S Nassar, MAM El-Bendary - Analog Integrated Circuits and …, 2021 - Springer
This paper presents several proposed scenarios for medical image transmission over
Wireless Multimedia Sensor Networks with multi-level security tools and Unequal Error …

High-performance ECC processor architecture design for IoT security applications

T Kudithi, R Sakthivel - The Journal of Supercomputing, 2019 - Springer
In recent years, the usage of elliptic curve cryptography (ECC) in IoT applications is steadily
increasing. The end nodes in IoT applications demand optimized device performance in …

A mobile cloud computing model using the cloudlet scheme for big data applications

AT Lo'ai, W Bakheder, H Song - 2016 IEEE First International …, 2016 - ieeexplore.ieee.org
The wide spread of smart phones and their capabilities made them an important part of
many people's life over the world. However, there are many challenges facing these devices …