Physical layer based message authentication with secure channel codes

D Chen, N Zhang, N Cheng, K Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate physical (PHY) layer message authentication to combat
adversaries with infinite computational capacity. Specifically, a PHY-layer authentication …

On message authentication channel capacity over a wiretap channel

D Chen, S Jiang, N Zhang, L Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a novel message authentication model using the same key over wiretap
channel is proposed to achieve information-theoretic security. Specifically, in the proposed …

An LDPC code based physical layer message authentication scheme with prefect security

D Chen, N Zhang, R Lu, X Fang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
In this paper, we study physical layer message authentication with perfect security for
wireless networks, regardless of the computational power of adversaries. Specifically, we …

Channel precoding based message authentication in wireless networks: Challenges and solutions

D Chen, N Zhang, R Lu, N Cheng, K Zhang… - IEEE Network, 2018 - ieeexplore.ieee.org
Due to the broadcast characteristic of the wireless medium, message impersonation and
substitution attacks can possibly be launched by an adversary with low cost in wireless …

Multi-message authentication over noisy channel with polar codes

D Chen, N Cheng, N Zhang, K Zhang… - 2017 IEEE 14th …, 2017 - ieeexplore.ieee.org
In this paper, we investigate multi-message authentication to combat adversaries with
infinite computational capacity. An authentication framework over a wiretap channel (W_1 …

A scan-out power reduction method for multi-cycle BIST

S Wang, Y Sato, K Miyase… - 2012 IEEE 21st Asian Test …, 2012 - ieeexplore.ieee.org
High test power in logic BIST is a serious problem not only for production test, but also for
board test, system debug or field test. Many low power BIST approaches that focus on scan …

Frequent symptom sets identification from uncertain medical data in differentially private way

Z Ding, Z Qin, Z Qin - Scientific Programming, 2017 - Wiley Online Library
Data mining techniques are applied to identify hidden patterns in large amounts of patient
data. These patterns can assist physicians in making more accurate diagnosis. For different …

Multi-message Authentication over Noisy Channel with Secure Channel Codes

D Chen, N Zhang, N Cheng, K Zhang, K Yang… - arXiv preprint arXiv …, 2017 - arxiv.org
In this paper, we investigate multi-message authentication to combat adversaries with
infinite computational capacity. An authentication framework over a wiretap channel $(W_1 …

Burst Control Packet Security in OBS networks

M David - 2021 - search.proquest.com
Optical networks gained interest due to the inadequacy of electrical networks to handle the
rapid growth of bandwidth requirements, as optical networks have significantly higher …

Unconditionally Secure Authentication and Integrity Protection for the Galileo Open Service Signal

S Sturaro - thesis.unipd.it
The operational GNSSs do not offer authentication and integrity protection for the Open
Service (OS) signal/message. But it is urgently needed, since several attacks can threat the …