نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

Journal: :مهندسی برق مدرس 0
shokofe vatanpour m.sc. student, department of electrical engineering, shahrood university of technology, iran. mohammad reza jvan assistant professor, department of electrical engineering, shahrood university of technology, iran

in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...

Journal: :مهندسی برق مدرس 0
shokofe vatanpour m.sc. student, department of electrical engineering, shahrood university of technology, iran. mohammad reza jvan assistant professor, department of electrical engineering, shahrood university of technology, iran

in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...

Mahmoud Ahmadian Mohammad Ehdaie, Mohammad Reza Aref Nikos Alexiou Panos Papadimitratos,

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

ژورنال: پیاورد سلامت 2020
Hosseini, Foroughosadat , Ronaghi, Mohammad Hossein ,

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

Journal: :IEEE Transactions on Communications 2021

Unmanned aerial vehicles (UAVs) communications have been widely exploited in our daily life, which leads to rising concerns about the security issue. This work investigates secrecy performance of a UAV-to-vehicle (UAV-2-V) communication system, where information delivered over both downlink and uplink between UAV ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http...

Journal: :Communications of the ACM 1978

Journal: :IEEE Transactions on Wireless Communications 2022

Exploiting short packets for communications is one of the key technologies realizing emerging application scenarios such as massive machine type (mMTC) and ultra-reliable low-latency (uRLLC). In this paper, we investigate short-packet to provide both reliability security guarantees simultaneously with an eavesdropper. particular, outage probability considering secrecy defined according characte...

Journal: :International journal of innovations in science and technology 2022

Data protection and information security have been the essence of communication in today's digital era. Authentication secrecy secure are achieved using key-based cryptographic primitives; which significantly relies upon underlying computationally complex mathematics. Moreover, these existing primitives considered to be non-deterministic on basis computational capabilities. However, considerabl...

Journal: :Jornada de Jóvenes Investigadores del I3A 1970

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید