Suchergebnisse - based active secure coding scheme

  1. 1

    CSI learning based active secure coding scheme for detectable wiretap channel von Zhao, Yizhi

    ISSN: 1751-8628, 1751-8636
    Veröffentlicht: The Institution of Engineering and Technology 06.10.2020
    Veröffentlicht in IET communications (06.10.2020)
    “… ) and present a new solution named active secure coding which combines the machine-learning methods with the traditional physical-layer secure coding scheme …”
    Volltext
    Journal Article
  2. 2

    CSI Learning Based Active Secure Coding Scheme For Detectable Wiretap Channel von Zhao, Yizhi

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 11.04.2020
    Veröffentlicht in arXiv.org (11.04.2020)
    “… ) and present a new solution named active secure coding which combines the machine learning methods with the traditional physical layer secure coding scheme …”
    Volltext
    Paper
  3. 3

    Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System von Ali, Yasir, Xia, Yuanqing, Sulek, Wojciech, Manzoor, Tayyab

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.03.2024
    Veröffentlicht in IEEE transactions on industrial informatics (01.03.2024)
    “… coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS …”
    Volltext
    Journal Article
  4. 4

    Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications von Xiao, Liang, Li, Hongyan, Yu, Shi, Zhang, Yi, Wang, Li-Chun, Ma, Shaodan

    ISSN: 0090-6778, 1558-0857
    Veröffentlicht: New York IEEE 01.09.2022
    Veröffentlicht in IEEE transactions on communications (01.09.2022)
    “… In this paper, we present a reinforcement learning (RL) based random linear network coding scheme for drone-aided cellular systems to address eavesdropping …”
    Volltext
    Journal Article
  5. 5

    Provably secure identity-based identification and signature schemes from code assumptions von Song, Bo, Zhao, Yiming

    ISSN: 1932-6203, 1932-6203
    Veröffentlicht: United States Public Library of Science 15.08.2017
    Veröffentlicht in PloS one (15.08.2017)
    “… In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique …”
    Volltext
    Journal Article
  6. 6

    Information-Theoretically Secure Erasure Codes for Distributed Storage von Rashmi, K. V., Shah, Nihar B., Ramchandran, Kannan, Kumar, P. Vijay

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 01.03.2018
    Veröffentlicht in IEEE transactions on information theory (01.03.2018)
    “… This paper presents coding schemes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries while maintaining high availability …”
    Volltext
    Journal Article
  7. 7

    ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications von Lv, Fengyan, Liu, Cheng, Liu, Xiaofeng, Hu, Chengyu, Chen, Zhihao, Guo, Shanqing

    ISSN: 1938-1883
    Veröffentlicht: IEEE 28.05.2023
    “… Popular Secure Instant Messaging (SIM) applications like Telegram and WhatsApp have deployed state-of-the-art encryption schemes in recent years to protect the security of user communications …”
    Volltext
    Tagungsbericht
  8. 8

    An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario von Wang, Beibei, Yue, Xiufang, Hao, Kun, Liu, Yonglei, Li, Zhisheng, Zhao, Xiaofang

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 01.05.2024
    Veröffentlicht in Sensors (Basel, Switzerland) (01.05.2024)
    “… This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT …”
    Volltext
    Journal Article
  9. 9

    ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications von Sakib, Shahnewaz Karim, Amariucai, George T, Guan, Yong

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.09.2023
    “… from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend …”
    Volltext
    Journal Article
  10. 10

    Identity based identification from algebraic coding theory von Yang, Guomin, Tan, Chik How, Mu, Yi, Susilo, Willy, Wong, Duncan S.

    ISSN: 0304-3975, 1879-2294
    Veröffentlicht: Elsevier B.V 06.02.2014
    Veröffentlicht in Theoretical computer science (06.02.2014)
    “… This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory …”
    Volltext
    Journal Article
  11. 11

    The Price of Active Security in Cryptographic Protocols von Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan, Weiss, Mor

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.07.2024
    Veröffentlicht in Journal of cryptology (01.07.2024)
    “… We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting …”
    Volltext
    Journal Article
  12. 12

    Secure quantum network coding for controlled repeater networks von Shang, Tao, Li, Jiao, Liu, Jian-wei

    ISSN: 1570-0755, 1573-1332
    Veröffentlicht: New York Springer US 01.07.2016
    Veröffentlicht in Quantum information processing (01.07.2016)
    “… To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party …”
    Volltext
    Journal Article
  13. 13

    An Efficient Group Key Transfer protocol for Secure Encryption von Murthy, A.V.V.S., Reddy, P. Vasudeva

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.10.2019
    Veröffentlicht in Journal of physics. Conference series (01.10.2019)
    “… These algorithms and protocols are based on sophisticated mathe-matics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups …”
    Volltext
    Journal Article
  14. 14

    DARIUS: A Digital Twin to Improve the Performance of Quantum Key Distribution von Ahmadian, Morteza, Ruiz, Marc, Comellas, Jaume, Velasco, Luis

    ISSN: 0733-8724, 1558-2213
    Veröffentlicht: New York IEEE 01.03.2024
    Veröffentlicht in Journal of lightwave technology (01.03.2024)
    “… Polarization encoded Quantum Key Distribution (QKD) is attracting great attention as it generates unlimitedly and unconditionally secure keys for different use cases …”
    Volltext
    Journal Article
  15. 15

    Covert Attack Detection and Resilient Control of Quadcopter von Wang, Junhong, Zhou, Sicheng, Xu, Lidan, Zhao, Dong, Guo, Kexin, Yu, Xiang, Guo, Lei

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.05.2025
    Veröffentlicht in IEEE transactions on industrial informatics (01.05.2025)
    “… Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed …”
    Volltext
    Journal Article
  16. 16

    Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach von Li, Hongyan, Yu, Shi, Lu, Xiaozhen, Xiao, Liang, Wang, Li-Chun

    Veröffentlicht: IEEE 01.12.2021
    “… This framework designs a model-based reinforcement learning to choose the BS network coding and transmission policy based on the jamming power sent by the active eavesdropper, the previous …”
    Volltext
    Tagungsbericht
  17. 17

    Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0 von Kalim Ullah, Manal Abdullah Alohali, Muhammad Ibrar ul Haque, Hany Mahgoub, Faisal Mohammed Nafie, Mohammed Assiri, Ali Nauman, Bhawani Shankar Chowdhry

    ISSN: 1319-1578
    Veröffentlicht: Springer 01.07.2023
    “… Secure and reliable wireless communication systems are essential for the successful integration of smart grid-enabled wireless communications and Industry 5.0 applications …”
    Volltext
    Journal Article
  18. 18

    Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding von MinJi Kim, Medard, M., Barros, J.

    ISSN: 0733-8716, 1558-0008
    Veröffentlicht: New York IEEE 01.12.2011
    Veröffentlicht in IEEE journal on selected areas in communications (01.12.2011)
    “… We propose a secure scheme for wireless network coding, called the algebraic watchdog …”
    Volltext
    Journal Article
  19. 19

    Opportunistic quantum network coding based on quantum teleportation von Shang, Tao, Du, Gang, Liu, Jian-wei

    ISSN: 1570-0755, 1573-1332
    Veröffentlicht: New York Springer US 01.04.2016
    Veröffentlicht in Quantum information processing (01.04.2016)
    “… In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation …”
    Volltext
    Journal Article
  20. 20

    Adaptive Video Data Hiding through Cost Assignment and STCs von Chen, Yanli, Wang, Hongxia, Wu, Hanzhou, Wu, Zhiqiang, Li, Tao, Malik, Asad

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.05.2021
    “… With the increasing popularity of digital video communication, video data hiding has become an active research topic in covert communication and privacy protection …”
    Volltext
    Journal Article