Search Results - based active secure coding scheme
-
1
CSI learning based active secure coding scheme for detectable wiretap channel
ISSN: 1751-8628, 1751-8636Published: The Institution of Engineering and Technology 06.10.2020Published in IET communications (06.10.2020)“…) and present a new solution named active secure coding which combines the machine-learning methods with the traditional physical-layer secure coding scheme…”
Get full text
Journal Article -
2
CSI Learning Based Active Secure Coding Scheme For Detectable Wiretap Channel
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 11.04.2020Published in arXiv.org (11.04.2020)“…) and present a new solution named active secure coding which combines the machine learning methods with the traditional physical layer secure coding scheme…”
Get full text
Paper -
3
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.03.2024Published in IEEE transactions on industrial informatics (01.03.2024)“… coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS…”
Get full text
Journal Article -
4
Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications
ISSN: 0090-6778, 1558-0857Published: New York IEEE 01.09.2022Published in IEEE transactions on communications (01.09.2022)“… In this paper, we present a reinforcement learning (RL) based random linear network coding scheme for drone-aided cellular systems to address eavesdropping…”
Get full text
Journal Article -
5
Provably secure identity-based identification and signature schemes from code assumptions
ISSN: 1932-6203, 1932-6203Published: United States Public Library of Science 15.08.2017Published in PloS one (15.08.2017)“… In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique…”
Get full text
Journal Article -
6
Information-Theoretically Secure Erasure Codes for Distributed Storage
ISSN: 0018-9448, 1557-9654Published: New York The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 01.03.2018Published in IEEE transactions on information theory (01.03.2018)“… This paper presents coding schemes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries while maintaining high availability…”
Get full text
Journal Article -
7
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications
ISSN: 1938-1883Published: IEEE 28.05.2023Published in IEEE International Conference on Communications (2003) (28.05.2023)“…Popular Secure Instant Messaging (SIM) applications like Telegram and WhatsApp have deployed state-of-the-art encryption schemes in recent years to protect the security of user communications…”
Get full text
Conference Proceeding -
8
An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 01.05.2024Published in Sensors (Basel, Switzerland) (01.05.2024)“… This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT…”
Get full text
Journal Article -
9
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.09.2023Published in IEEE transactions on dependable and secure computing (01.09.2023)“… from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend…”
Get full text
Journal Article -
10
Identity based identification from algebraic coding theory
ISSN: 0304-3975, 1879-2294Published: Elsevier B.V 06.02.2014Published in Theoretical computer science (06.02.2014)“… This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory…”
Get full text
Journal Article -
11
The Price of Active Security in Cryptographic Protocols
ISSN: 0933-2790, 1432-1378Published: New York Springer US 01.07.2024Published in Journal of cryptology (01.07.2024)“…We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting…”
Get full text
Journal Article -
12
Secure quantum network coding for controlled repeater networks
ISSN: 1570-0755, 1573-1332Published: New York Springer US 01.07.2016Published in Quantum information processing (01.07.2016)“…To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party…”
Get full text
Journal Article -
13
An Efficient Group Key Transfer protocol for Secure Encryption
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.10.2019Published in Journal of physics. Conference series (01.10.2019)“… These algorithms and protocols are based on sophisticated mathe-matics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups…”
Get full text
Journal Article -
14
DARIUS: A Digital Twin to Improve the Performance of Quantum Key Distribution
ISSN: 0733-8724, 1558-2213Published: New York IEEE 01.03.2024Published in Journal of lightwave technology (01.03.2024)“…Polarization encoded Quantum Key Distribution (QKD) is attracting great attention as it generates unlimitedly and unconditionally secure keys for different use cases…”
Get full text
Journal Article -
15
Covert Attack Detection and Resilient Control of Quadcopter
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.05.2025Published in IEEE transactions on industrial informatics (01.05.2025)“… Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed…”
Get full text
Journal Article -
16
Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach
Published: IEEE 01.12.2021Published in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)“… This framework designs a model-based reinforcement learning to choose the BS network coding and transmission policy based on the jamming power sent by the active eavesdropper, the previous…”
Get full text
Conference Proceeding -
17
Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0
ISSN: 1319-1578Published: Springer 01.07.2023Published in Journal of King Saud University. Computer and information sciences (01.07.2023)“…Secure and reliable wireless communication systems are essential for the successful integration of smart grid-enabled wireless communications and Industry 5.0 applications…”
Get full text
Journal Article -
18
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
ISSN: 0733-8716, 1558-0008Published: New York IEEE 01.12.2011Published in IEEE journal on selected areas in communications (01.12.2011)“…We propose a secure scheme for wireless network coding, called the algebraic watchdog…”
Get full text
Journal Article -
19
Opportunistic quantum network coding based on quantum teleportation
ISSN: 1570-0755, 1573-1332Published: New York Springer US 01.04.2016Published in Quantum information processing (01.04.2016)“… In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation…”
Get full text
Journal Article -
20
Adaptive Video Data Hiding through Cost Assignment and STCs
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.05.2021Published in IEEE transactions on dependable and secure computing (01.05.2021)“…With the increasing popularity of digital video communication, video data hiding has become an active research topic in covert communication and privacy protection…”
Get full text
Journal Article