Search Results - based active secure coding scheme

Refine Results
  1. 1

    CSI learning based active secure coding scheme for detectable wiretap channel by Zhao, Yizhi

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 06.10.2020
    Published in IET communications (06.10.2020)
    “…) and present a new solution named active secure coding which combines the machine-learning methods with the traditional physical-layer secure coding scheme…”
    Get full text
    Journal Article
  2. 2

    CSI Learning Based Active Secure Coding Scheme For Detectable Wiretap Channel by Zhao, Yizhi

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 11.04.2020
    Published in arXiv.org (11.04.2020)
    “…) and present a new solution named active secure coding which combines the machine learning methods with the traditional physical layer secure coding scheme…”
    Get full text
    Paper
  3. 3

    Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System by Ali, Yasir, Xia, Yuanqing, Sulek, Wojciech, Manzoor, Tayyab

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.03.2024
    “… coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS…”
    Get full text
    Journal Article
  4. 4

    Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications by Xiao, Liang, Li, Hongyan, Yu, Shi, Zhang, Yi, Wang, Li-Chun, Ma, Shaodan

    ISSN: 0090-6778, 1558-0857
    Published: New York IEEE 01.09.2022
    Published in IEEE transactions on communications (01.09.2022)
    “… In this paper, we present a reinforcement learning (RL) based random linear network coding scheme for drone-aided cellular systems to address eavesdropping…”
    Get full text
    Journal Article
  5. 5

    Provably secure identity-based identification and signature schemes from code assumptions by Song, Bo, Zhao, Yiming

    ISSN: 1932-6203, 1932-6203
    Published: United States Public Library of Science 15.08.2017
    Published in PloS one (15.08.2017)
    “… In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique…”
    Get full text
    Journal Article
  6. 6

    Information-Theoretically Secure Erasure Codes for Distributed Storage by Rashmi, K. V., Shah, Nihar B., Ramchandran, Kannan, Kumar, P. Vijay

    ISSN: 0018-9448, 1557-9654
    Published: New York The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 01.03.2018
    Published in IEEE transactions on information theory (01.03.2018)
    “… This paper presents coding schemes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries while maintaining high availability…”
    Get full text
    Journal Article
  7. 7

    ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications by Lv, Fengyan, Liu, Cheng, Liu, Xiaofeng, Hu, Chengyu, Chen, Zhihao, Guo, Shanqing

    ISSN: 1938-1883
    Published: IEEE 28.05.2023
    “…Popular Secure Instant Messaging (SIM) applications like Telegram and WhatsApp have deployed state-of-the-art encryption schemes in recent years to protect the security of user communications…”
    Get full text
    Conference Proceeding
  8. 8

    An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario by Wang, Beibei, Yue, Xiufang, Hao, Kun, Liu, Yonglei, Li, Zhisheng, Zhao, Xiaofang

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 01.05.2024
    Published in Sensors (Basel, Switzerland) (01.05.2024)
    “… This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT…”
    Get full text
    Journal Article
  9. 9

    ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications by Sakib, Shahnewaz Karim, Amariucai, George T, Guan, Yong

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.09.2023
    “… from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend…”
    Get full text
    Journal Article
  10. 10

    Identity based identification from algebraic coding theory by Yang, Guomin, Tan, Chik How, Mu, Yi, Susilo, Willy, Wong, Duncan S.

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 06.02.2014
    Published in Theoretical computer science (06.02.2014)
    “… This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory…”
    Get full text
    Journal Article
  11. 11

    The Price of Active Security in Cryptographic Protocols by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan, Weiss, Mor

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2024
    Published in Journal of cryptology (01.07.2024)
    “…We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting…”
    Get full text
    Journal Article
  12. 12

    Secure quantum network coding for controlled repeater networks by Shang, Tao, Li, Jiao, Liu, Jian-wei

    ISSN: 1570-0755, 1573-1332
    Published: New York Springer US 01.07.2016
    Published in Quantum information processing (01.07.2016)
    “…To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party…”
    Get full text
    Journal Article
  13. 13

    An Efficient Group Key Transfer protocol for Secure Encryption by Murthy, A.V.V.S., Reddy, P. Vasudeva

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.10.2019
    Published in Journal of physics. Conference series (01.10.2019)
    “… These algorithms and protocols are based on sophisticated mathe-matics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups…”
    Get full text
    Journal Article
  14. 14

    DARIUS: A Digital Twin to Improve the Performance of Quantum Key Distribution by Ahmadian, Morteza, Ruiz, Marc, Comellas, Jaume, Velasco, Luis

    ISSN: 0733-8724, 1558-2213
    Published: New York IEEE 01.03.2024
    Published in Journal of lightwave technology (01.03.2024)
    “…Polarization encoded Quantum Key Distribution (QKD) is attracting great attention as it generates unlimitedly and unconditionally secure keys for different use cases…”
    Get full text
    Journal Article
  15. 15

    Covert Attack Detection and Resilient Control of Quadcopter by Wang, Junhong, Zhou, Sicheng, Xu, Lidan, Zhao, Dong, Guo, Kexin, Yu, Xiang, Guo, Lei

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.05.2025
    “… Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed…”
    Get full text
    Journal Article
  16. 16

    Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach by Li, Hongyan, Yu, Shi, Lu, Xiaozhen, Xiao, Liang, Wang, Li-Chun

    Published: IEEE 01.12.2021
    “… This framework designs a model-based reinforcement learning to choose the BS network coding and transmission policy based on the jamming power sent by the active eavesdropper, the previous…”
    Get full text
    Conference Proceeding
  17. 17

    Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0 by Kalim Ullah, Manal Abdullah Alohali, Muhammad Ibrar ul Haque, Hany Mahgoub, Faisal Mohammed Nafie, Mohammed Assiri, Ali Nauman, Bhawani Shankar Chowdhry

    ISSN: 1319-1578
    Published: Springer 01.07.2023
    “…Secure and reliable wireless communication systems are essential for the successful integration of smart grid-enabled wireless communications and Industry 5.0 applications…”
    Get full text
    Journal Article
  18. 18

    Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding by MinJi Kim, Medard, M., Barros, J.

    ISSN: 0733-8716, 1558-0008
    Published: New York IEEE 01.12.2011
    “…We propose a secure scheme for wireless network coding, called the algebraic watchdog…”
    Get full text
    Journal Article
  19. 19

    Opportunistic quantum network coding based on quantum teleportation by Shang, Tao, Du, Gang, Liu, Jian-wei

    ISSN: 1570-0755, 1573-1332
    Published: New York Springer US 01.04.2016
    Published in Quantum information processing (01.04.2016)
    “… In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation…”
    Get full text
    Journal Article
  20. 20

    Adaptive Video Data Hiding through Cost Assignment and STCs by Chen, Yanli, Wang, Hongxia, Wu, Hanzhou, Wu, Zhiqiang, Li, Tao, Malik, Asad

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.05.2021
    “…With the increasing popularity of digital video communication, video data hiding has become an active research topic in covert communication and privacy protection…”
    Get full text
    Journal Article