총 601건 중 601건 출력
, 4/61 페이지
-
31
-
Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification
-
Yildirim, Seckin Anil;
Alves, Joao;
Center for Connected Autonomy and AI, Florida Atlantic University, FL, USA;
NATO STO Centre for Maritime Research and Experimentation, La Spezia, Italy;
NATO STO Centre for Maritime Research and Experimentation, La Spezia, Italy;
Center for Connected Autonomy and AI, Florida Atlantic University, FL, USA;
(Underwater Communications and Networking Conference (UComms),2021 Fifth,
v.2021,
2021,
pp.1-5)
-
32
-
A Game With Randomly Distributed Eavesdroppers in Wireless Ad Hoc Networks: A Secrecy EE Perspective
-
Kwon, Younggap;
Wang, Xudong;
Hwang, Taewon;
;
(IEEE transactions on vehicular technology,
v.66,
2017,
pp.9916-9930)
-
33
-
Secret sharing in fast fading channels based on reliability-based hybrid ARQ
-
Chan Wong Wong;
Shea, J.M.;
Wong, T.F.;
;
(Military Communications Conference, 2008. MILCOM 2008. IEEE,
v.2008,
2008,
pp.1-7)
-
34
-
Deterministic Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
-
Chamon, Christiana;
Ferdous, Shahriar;
Kish, Laszlo B.;
Department of Electrical and Computer Engineering, Texas A&M University, TAMUS 3128, College Station, TX 77843-3128, USA;
Department of Electrical and Computer Engineering, Texas A&M University, TAMUS 3128, College Station, TX 77843-3128, USA;
Department of Electrical and Computer Engineering, Texas A&M University, TAMUS 3128, College Station, TX 77843-3128, USA;
(Fluctuation and Noise Letters,
v.20,
2021,
pp.2150046)
-
35
-
Conditions for degradability of tripartite quantum states
-
Fung, Chi-Hang Fred;
Li, Chi-Kwong;
Sze, Nung-Sing;
Chau, H F;
;
(Journal of Physics. A : Mathematical and theoretical,
v.47,
2014,
pp.115306)
-
36
-
Efficient AN-Aided Scheme to Power RF-EH Source Nodes and Secure Their Transmissions
-
El Shafie, Ahmed;
Mabrouk, Asma;
Tourki, Kamel;
Al-Dhahir, Naofal;
;
(IEEE wireless communications letters,
v.6,
2017,
pp.670-673)
-
37
-
A GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOL
-
HOUSHMAND, MAHBOOBEH;
HOUSHMAND, MONIREH;
MASHHADI, HABIB RAJABI;
Department of Computer Engineering and Information Technology, Amirkabir University of Technology, Tehran, Iran;
Department of Electrical Engineering, Imam Reza University, Mashhad, Iran;
Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran;
(International journal of quantum information,
v.9,
2011,
pp.1133-1146)
-
38
-
Achieving Secret Communication for Fast Rayleigh Fading Channels
-
Zang Li;
Yates, R;
Trappe, W;
Dept. of Electr. & Comput. Eng., Rutgers Univ., North Brunswick, NJ, USA;
Dept. of Electr. & Comput. Eng., Rutgers Univ., North Brunswick, NJ, USA;
Dept. of Electr. & Comput. Eng., Rutgers Univ., North Brunswick, NJ, USA;
(IEEE transactions on wireless communications,
v.9,
2010,
pp.2792-2799)
-
39
-
Secure compute-and-forward transmission with artificial noise and full-duplex devices
-
Tomasin, Stefano;
;
(Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016 IEEE 27th Annual International Symposium on,
v.2016,
2016,
pp.1-6)
-
40
-
The eavesdropping and Jamming Dilemma in multi-channel communications
-
Garnaev, Andrey;
Trappe, Wade;
;
(Communications (ICC), 2013 IEEE International Conference on,
v.2013,
2013,
pp.2160-2164)