[HTML][HTML] Signal processing techniques for 6G

L Mucchi, S Shahabuddin, MAM Albreem… - Journal of Signal …, 2023 - Springer
Abstract 6G networks have the burden to provide not only higher performance compared to
5G, but also to enable new service domains as well as to open the door over a new …

Training sequence design for discriminatory channel estimation in wireless MIMO systems

TH Chang, WC Chiang, YWP Hong… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
This paper proposes a training-based channel estimation scheme for achieving quality-of-
service discrimination between legitimate and unauthorized receivers in wireless multiple …

Security and reliability performance of noise-loop modulation: Theoretical analysis and experimentation

L Mucchi, S Caputo, P Marcocci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Security is a crucial feature of current (5G) and even more for future (6G) communication
networks. While the innate nature of the wireless channel is an issue for guaranteeing …

Physical layer cryptography and cognitive networks

L Mucchi, LS Ronga, E Del Re - Wireless Personal Communications, 2011 - Springer
Recently the huge development of different and heterogeneous wireless communication
systems raises the problem of growing spectrum scarcity. Cognitive radio tends to solve this …

[PDF][PDF] Quantum cryptography for secure communication in IEEE 802.11 wireless networks

S Wijesekera - 2011 - researchprofiles.canberra.edu.au
IEEE 802.11 is the Wireless Local Area Networks (WLAN) standard developed by the IEEE
LAN/MAN Standards Committee. WLANs are increasingly deployed by businesses …

Noise-loop multiple access

L Mucchi, L Ronga, G Chisci - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
A fundamental problem for signal processing in wireless communications is the separation
of multiple signals/users from their mixture. The problem is simpler if they are …

Non coherent demodulation of bpsk secure symbols

F Zorzi, L Mucchi, LS Ronga, P Marcocci… - 2013 16th …, 2013 - ieeexplore.ieee.org
From the communication channel and implementation aspects of communications, the
transmission environment may be sufficiently degraded that introduces practical difficulties …

Secrecy capacity of the Noise-Loop secure modulation

L Mucchi, L Ronga, E Del Re… - 2014 4th International …, 2014 - ieeexplore.ieee.org
The issues of privacy and security in wireless communication networks have taken on an
increasingly important role as these networks continue to be deployed worldwide …

Distributed matching algorithms for spectrum access: a comparative study and further enhancements

B Ali, N Zamir, SX Ng, MFU Butt - KSII Transactions on Internet and …, 2018 - koreascience.kr
In this paper, we consider a spectrum access scenario which consists of two groups of users,
namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio …

[HTML][HTML] A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

F Ciabini, S Morosi, L Mucchi, LS Ronga - Information, 2016 - mdpi.com
Physical-layer security is now being considered for information protection in future wireless
communications. However, a better understanding of the inherent secrecy of wireless …