We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a...
Hugo Reboredo, Vinay Uday Prabhu, Miguel R. D. Rod...
Following the joint source and channel coding paradigm, we propose in this article an application controlling strategy to allow fast adaptation of multimedia transmission to the i...
Application Layer Forward Error Correction (AL)-FEC is increasingly being employed in the emerging wireless multimedia applications, where the multimedia data is sent along with r...
Sajid Nazir, Dejan Vukobratovic, Vladimir Stankovi...
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...