Sciweavers

210 search results - page 28 / 42
» Wiretap Channel With Side Information
Sort
View
GLOBECOM
2009
IEEE
15 years 2 months ago
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sen...
Sami Akin, Mustafa Cenk Gursoy
DAM
2008
136views more  DAM 2008»
14 years 10 months ago
General theory of information transfer: Updated
We report on ideas, problems and results, which occupied us during the past decade and which seem to extend the frontiers of information theory in several directions. The main con...
Rudolf Ahlswede
NDSS
2002
IEEE
15 years 3 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
JSAC
2007
98views more  JSAC 2007»
14 years 10 months ago
Optimum Power Allocation for Single-User MIMO and Multi-User MIMO-MAC with Partial CSI
Abstract— We consider both the single-user and the multiuser power allocation problems in MIMO systems, where the receiver side has the perfect channel state information (CSI), a...
Alper Soysal, Sennur Ulukus
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow