Výsledky vyhledávání - based active secure coding scheme
-
1
CSI learning based active secure coding scheme for detectable wiretap channel
ISSN: 1751-8628, 1751-8636Vydáno: The Institution of Engineering and Technology 06.10.2020Vydáno v IET communications (06.10.2020)“…) and present a new solution named active secure coding which combines the machine-learning methods with the traditional physical-layer secure coding scheme…”
Získat plný text
Journal Article -
2
CSI Learning Based Active Secure Coding Scheme For Detectable Wiretap Channel
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 11.04.2020Vydáno v arXiv.org (11.04.2020)“…) and present a new solution named active secure coding which combines the machine learning methods with the traditional physical layer secure coding scheme…”
Získat plný text
Paper -
3
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System
ISSN: 1551-3203, 1941-0050Vydáno: Piscataway IEEE 01.03.2024Vydáno v IEEE transactions on industrial informatics (01.03.2024)“… coding for orthogonal frequency division multiplexing over an active power network (OFDM-AON) to ensure the reliability and security of the NOCCS…”
Získat plný text
Journal Article -
4
Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications
ISSN: 0090-6778, 1558-0857Vydáno: New York IEEE 01.09.2022Vydáno v IEEE transactions on communications (01.09.2022)“… In this paper, we present a reinforcement learning (RL) based random linear network coding scheme for drone-aided cellular systems to address eavesdropping…”
Získat plný text
Journal Article -
5
Provably secure identity-based identification and signature schemes from code assumptions
ISSN: 1932-6203, 1932-6203Vydáno: United States Public Library of Science 15.08.2017Vydáno v PloS one (15.08.2017)“… In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique…”
Získat plný text
Journal Article -
6
Information-Theoretically Secure Erasure Codes for Distributed Storage
ISSN: 0018-9448, 1557-9654Vydáno: New York The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 01.03.2018Vydáno v IEEE transactions on information theory (01.03.2018)“… This paper presents coding schemes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries while maintaining high availability…”
Získat plný text
Journal Article -
7
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications
ISSN: 1938-1883Vydáno: IEEE 28.05.2023Vydáno v IEEE International Conference on Communications (2003) (28.05.2023)“…Popular Secure Instant Messaging (SIM) applications like Telegram and WhatsApp have deployed state-of-the-art encryption schemes in recent years to protect the security of user communications…”
Získat plný text
Konferenční příspěvek -
8
An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario
ISSN: 1424-8220, 1424-8220Vydáno: Switzerland MDPI AG 01.05.2024Vydáno v Sensors (Basel, Switzerland) (01.05.2024)“… This paper addresses the aforementioned limitations by proposing an underwater source location privacy protection scheme based on game theory under the scenario of multiple cooperating attackers (SLP-MACGT…”
Získat plný text
Journal Article -
9
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
ISSN: 1545-5971, 1941-0018Vydáno: Washington IEEE 01.09.2023Vydáno v IEEE transactions on dependable and secure computing (01.09.2023)“… from restrictive assumptions about the environment. Recent techniques for exploiting co-location are based on the notion of quality time and rely on sophisticated throttled clue-issuing mechanisms that allow a device with enough time to spend…”
Získat plný text
Journal Article -
10
Identity based identification from algebraic coding theory
ISSN: 0304-3975, 1879-2294Vydáno: Elsevier B.V 06.02.2014Vydáno v Theoretical computer science (06.02.2014)“… This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory…”
Získat plný text
Journal Article -
11
The Price of Active Security in Cryptographic Protocols
ISSN: 0933-2790, 1432-1378Vydáno: New York Springer US 01.07.2024Vydáno v Journal of cryptology (01.07.2024)“…We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting…”
Získat plný text
Journal Article -
12
Secure quantum network coding for controlled repeater networks
ISSN: 1570-0755, 1573-1332Vydáno: New York Springer US 01.07.2016Vydáno v Quantum information processing (01.07.2016)“…To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party…”
Získat plný text
Journal Article -
13
An Efficient Group Key Transfer protocol for Secure Encryption
ISSN: 1742-6588, 1742-6596Vydáno: Bristol IOP Publishing 01.10.2019Vydáno v Journal of physics. Conference series (01.10.2019)“… These algorithms and protocols are based on sophisticated mathe-matics such as computational and algorithmic algebraic geometry, coding theory, and generic algorithms for finite abelian groups…”
Získat plný text
Journal Article -
14
DARIUS: A Digital Twin to Improve the Performance of Quantum Key Distribution
ISSN: 0733-8724, 1558-2213Vydáno: New York IEEE 01.03.2024Vydáno v Journal of lightwave technology (01.03.2024)“…Polarization encoded Quantum Key Distribution (QKD) is attracting great attention as it generates unlimitedly and unconditionally secure keys for different use cases…”
Získat plný text
Journal Article -
15
Covert Attack Detection and Resilient Control of Quadcopter
ISSN: 1551-3203, 1941-0050Vydáno: Piscataway IEEE 01.05.2025Vydáno v IEEE transactions on industrial informatics (01.05.2025)“… Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed…”
Získat plný text
Journal Article -
16
Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach
Vydáno: IEEE 01.12.2021Vydáno v 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)“… This framework designs a model-based reinforcement learning to choose the BS network coding and transmission policy based on the jamming power sent by the active eavesdropper, the previous…”
Získat plný text
Konferenční příspěvek -
17
Hybrid precoding design for secure smart-grid enabled MIMO wireless communications in Industry 5.0
ISSN: 1319-1578Vydáno: Springer 01.07.2023Vydáno v Journal of King Saud University. Computer and information sciences (01.07.2023)“…Secure and reliable wireless communication systems are essential for the successful integration of smart grid-enabled wireless communications and Industry 5.0 applications…”
Získat plný text
Journal Article -
18
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
ISSN: 0733-8716, 1558-0008Vydáno: New York IEEE 01.12.2011Vydáno v IEEE journal on selected areas in communications (01.12.2011)“…We propose a secure scheme for wireless network coding, called the algebraic watchdog…”
Získat plný text
Journal Article -
19
Opportunistic quantum network coding based on quantum teleportation
ISSN: 1570-0755, 1573-1332Vydáno: New York Springer US 01.04.2016Vydáno v Quantum information processing (01.04.2016)“… In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation…”
Získat plný text
Journal Article -
20
Adaptive Video Data Hiding through Cost Assignment and STCs
ISSN: 1545-5971, 1941-0018Vydáno: Washington IEEE 01.05.2021Vydáno v IEEE transactions on dependable and secure computing (01.05.2021)“…With the increasing popularity of digital video communication, video data hiding has become an active research topic in covert communication and privacy protection…”
Získat plný text
Journal Article