Suchergebnisse - based active secure coding scheme
-
1
CSI learning based active secure coding scheme for detectable wiretap channel
ISSN: 1751-8628, 1751-8636Veröffentlicht: The Institution of Engineering and Technology 06.10.2020Veröffentlicht in IET communications (06.10.2020)“… ) and present a new solution named active secure coding which combines the machine-learning methods with the traditional physical-layer secure coding scheme …”
Volltext
Journal Article -
2
CSI Learning Based Active Secure Coding Scheme For Detectable Wiretap Channel
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 11.04.2020Veröffentlicht in arXiv.org (11.04.2020)“… ) and present a new solution named active secure coding which combines the machine learning methods with the traditional physical layer secure coding scheme …”
Volltext
Paper -
3
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System
ISSN: 1551-3203, 1941-0050Veröffentlicht: Piscataway IEEE 01.03.2024Veröffentlicht in IEEE transactions on industrial informatics (01.03.2024)“… coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS …”
Volltext
Journal Article -
4
Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications
ISSN: 0090-6778, 1558-0857Veröffentlicht: New York IEEE 01.09.2022Veröffentlicht in IEEE transactions on communications (01.09.2022)“… In this paper, we present a reinforcement learning (RL) based random linear network coding scheme for drone-aided cellular systems to address eavesdropping …”
Volltext
Journal Article -
5
Provably secure identity-based identification and signature schemes from code assumptions
ISSN: 1932-6203, 1932-6203Veröffentlicht: United States Public Library of Science 15.08.2017Veröffentlicht in PloS one (15.08.2017)“… In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique …”
Volltext
Journal Article -
6
Information-Theoretically Secure Erasure Codes for Distributed Storage
ISSN: 0018-9448, 1557-9654Veröffentlicht: New York The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 01.03.2018Veröffentlicht in IEEE transactions on information theory (01.03.2018)“… This paper presents coding schemes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries while maintaining high availability …”
Volltext
Journal Article -
7
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications
ISSN: 1938-1883Veröffentlicht: IEEE 28.05.2023Veröffentlicht in IEEE International Conference on Communications (2003) (28.05.2023)“… Popular Secure Instant Messaging (SIM) applications like Telegram and WhatsApp have deployed state-of-the-art encryption schemes in recent years to protect the security of user communications …”
Volltext
Tagungsbericht -
8
An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 01.05.2024Veröffentlicht in Sensors (Basel, Switzerland) (01.05.2024)“… This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT …”
Volltext
Journal Article -
9
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.09.2023Veröffentlicht in IEEE transactions on dependable and secure computing (01.09.2023)“… from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend …”
Volltext
Journal Article -
10
Identity based identification from algebraic coding theory
ISSN: 0304-3975, 1879-2294Veröffentlicht: Elsevier B.V 06.02.2014Veröffentlicht in Theoretical computer science (06.02.2014)“… This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory …”
Volltext
Journal Article -
11
The Price of Active Security in Cryptographic Protocols
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer US 01.07.2024Veröffentlicht in Journal of cryptology (01.07.2024)“… We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting …”
Volltext
Journal Article -
12
Secure quantum network coding for controlled repeater networks
ISSN: 1570-0755, 1573-1332Veröffentlicht: New York Springer US 01.07.2016Veröffentlicht in Quantum information processing (01.07.2016)“… To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party …”
Volltext
Journal Article -
13
An Efficient Group Key Transfer protocol for Secure Encryption
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.10.2019Veröffentlicht in Journal of physics. Conference series (01.10.2019)“… These algorithms and protocols are based on sophisticated mathe-matics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups …”
Volltext
Journal Article -
14
DARIUS: A Digital Twin to Improve the Performance of Quantum Key Distribution
ISSN: 0733-8724, 1558-2213Veröffentlicht: New York IEEE 01.03.2024Veröffentlicht in Journal of lightwave technology (01.03.2024)“… Polarization encoded Quantum Key Distribution (QKD) is attracting great attention as it generates unlimitedly and unconditionally secure keys for different use cases …”
Volltext
Journal Article -
15
Covert Attack Detection and Resilient Control of Quadcopter
ISSN: 1551-3203, 1941-0050Veröffentlicht: Piscataway IEEE 01.05.2025Veröffentlicht in IEEE transactions on industrial informatics (01.05.2025)“… Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed …”
Volltext
Journal Article -
16
Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach
Veröffentlicht: IEEE 01.12.2021Veröffentlicht in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)“… This framework designs a model-based reinforcement learning to choose the BS network coding and transmission policy based on the jamming power sent by the active eavesdropper, the previous …”
Volltext
Tagungsbericht -
17
Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0
ISSN: 1319-1578Veröffentlicht: Springer 01.07.2023Veröffentlicht in Journal of King Saud University. Computer and information sciences (01.07.2023)“… Secure and reliable wireless communication systems are essential for the successful integration of smart grid-enabled wireless communications and Industry 5.0 applications …”
Volltext
Journal Article -
18
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
ISSN: 0733-8716, 1558-0008Veröffentlicht: New York IEEE 01.12.2011Veröffentlicht in IEEE journal on selected areas in communications (01.12.2011)“… We propose a secure scheme for wireless network coding, called the algebraic watchdog …”
Volltext
Journal Article -
19
Opportunistic quantum network coding based on quantum teleportation
ISSN: 1570-0755, 1573-1332Veröffentlicht: New York Springer US 01.04.2016Veröffentlicht in Quantum information processing (01.04.2016)“… In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation …”
Volltext
Journal Article -
20
Adaptive Video Data Hiding through Cost Assignment and STCs
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.05.2021Veröffentlicht in IEEE transactions on dependable and secure computing (01.05.2021)“… With the increasing popularity of digital video communication, video data hiding has become an active research topic in covert communication and privacy protection …”
Volltext
Journal Article