|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 812 occurrences of 415 keywords
|
|
|
Results
Found 4070 publication records. Showing 4070 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt |
Secret keys from entangled sensor motes: implementation and analysis. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
wsns, key generation |
17 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti |
POTSHARDS - a secure, recoverable, long-term archival storage system. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
approximate pointers, secret splitting, Archival storage |
17 | Mark Manulis |
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Hossein Ghodosi, Josef Pieprzyk |
Multi-Party Computation with Omnipresent Adversary. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation |
17 | Lucie Langer, Melanie Volkamer, Stefan G. Weber, Axel Schmidt 0001, Johannes Buchmann 0001 |
Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model. |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
long-term anonymity, electronic voting, security requirements, verifiability |
17 | Moreno Falaschi, Carlos Olarte, Catuscia Palamidessi |
A framework for abstract interpretation of timed concurrent constraint programs. |
PPDP |
2009 |
DBLP DOI BibTeX RDF |
timed concurrent constraint programming, abstract interpretation, reactive systems, denotational semantics, process calculi |
17 | Wei Du, Mingxing He, Xiao Li |
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs |
17 | Helmut Seidl, Kumar Neeraj Verma |
Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case. |
RTA |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Helmut Seidl, Kumar Neeraj Verma |
Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying. |
ACM Trans. Comput. Log. |
2008 |
DBLP DOI BibTeX RDF |
instantiation-based theorem proving, Cryptographic protocols, first-order logic, resolution, Horn clauses |
17 | Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin |
Network Security for Client-Server Architecture Using Wiretap Codes. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Alfred Menezes, Berkant Ustaoglu |
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-56A, provable security, security models, key agreement protocols |
17 | Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina |
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. |
CAV |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Anongporn Salaiwarakul, Mark Ryan 0001 |
Analysis of a Biometric Authentication Protocol for Signature Creation Application. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung |
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Junzhou Luo, Ming Yang 0001 |
Analysis of security protocols based on challenge-response. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
Strand Space Model, network security, protocol analysis, challenge-response |
17 | Kohei Honda 0001, Nobuko Yoshida |
A uniform type structure for secure information flow. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
The ?-calculus, type-based program analysis, typing system, secure information flow |
17 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis |
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
intrusion attacks, e-commerce protocols, model checking, SPIN |
17 | Max I. Kanovich, Paul D. Rowe, Andre Scedrov |
Collaborative Planning With Privacy. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jan Nikodem, Maciej Nikodem |
Secure and Scalable Communication in Vehicle Ad Hoc Networks. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
node exclusion, security, ad hoc networks, key distribution |
17 | Woei-Jiunn Tsaur, Haw-Tyng Pai |
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ratna Dutta, Sourav Mukhopadhyay |
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, self-healing, revocation, rekeying |
17 | Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin |
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
multicast key management, broadcast encryption |
17 | Brian Rogers, Milos Prvulovic, Yan Solihin |
Efficient data protection for distributed shared memory multiprocessors. |
PACT |
2006 |
DBLP DOI BibTeX RDF |
DSM multiprocessor, memory encryption and authentication, data security |
17 | Florian Kerschbaum |
Practical Private Regular Expression Matching. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai |
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Silvio Micali, Rafael Pass |
Local zero knowledge. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
cryptography, zero knowledge |
17 | Liming Wang, Chuan-Kun Wu |
Authenticated Group Key Agreement for Multicast. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Seung Wook Jung, Souhwan Jung |
Secure Password Authentication for Distributed Computing. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon |
Ternary Tree Based Group Key Management in Dynamic Peer Networks. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Luo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen |
Some new characters on the wire-tap channel of type II. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Naren Kodali, Csilla Farkas, Duminda Wijesekera |
Enforcing Semantics-Aware Security in Multimedia Surveillance. |
J. Data Semantics |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Peter P. Swire |
Security market: incentives for disclosure of vulnerabilities. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Iliano Cervesato, Catherine Meadows 0001, Dusko Pavlovic |
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Peter Y. A. Ryan |
A variant of the Chaum voter-verifiable scheme. |
WITS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Abdul Sahid Khan, Madhavan Mukund, S. P. Suresh |
Generic Verification of Security Protocols. |
SPIN |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Véronique Cortier, Bogdan Warinschi |
Computationally Sound, Automated Proofs for Security Protocols. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Markus Hinkelmann, Andreas Jakoby |
Communications in Unknown Networks: Preserving the Secret of Topology. |
SIROCCO |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Helmut Seidl, Kumar Neeraj Verma |
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo |
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Roberto Zunino, Pierpaolo Degano |
A Note on the Perfect Encryption Assumption in a Process Calculus. |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 |
One-Round Protocols for Two-Party Authenticated Key Exchange. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Unconditionally Secure Encryption Under Strong Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Christian Cachin, Reto Strobl |
Asynchronous group key exchange with failures. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
provable security, group communication, universal composability, group key exchange |
17 | Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo |
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan |
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity |
17 | Liqun Chen 0002, Caroline Kudla |
Identity Based Authenticated Key Agreement Protocols from Pairings. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Joseph Y. Halpern, Kevin R. O'Neill |
Anonymity and Information Hiding in Multiagent Systems. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Peter Thiemann 0001 |
A Prototype Dependency Calculus. |
ESOP |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Kevin Driscoll 0001 |
BeepBeep: Embedded Real-Time Encryption. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Lih-Chyau Wuu, Hui-Chun Chen |
A Scalable Framework for Secure Group Communication. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Peter Y. A. Ryan |
Mathematical Models of Computer Security. |
FOSAD |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Andrew C. Myers, Barbara Liskov |
Complete, Safe Information Flow with Decentralized Labels. |
S&P |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gemmell, Moni Naor |
Codes for Interactive Authentication. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Hugo Krawczyk |
Secret Sharing Made Short. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch |
Cap unification: application to protocol security modulo homomorphic encryption. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
secrecy analysis, protocol, rewriting, unification |
17 | Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo |
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
sandwich attack, forward and backward secrecy, supervisory control and data acquisition, wireless sensor network, key management, node, process control systems |
17 | Chung-Fu Lu, Tzong-Chen Wu, Tzay-Farn Shih |
Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks. |
CISIS |
2010 |
DBLP DOI BibTeX RDF |
Unbalanced wireless networks, Mutual authentication, Group key agreement, Forward secrecy |
17 | Mengbo Hou, Qiuliang Xu |
Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
key replicating attack, identity-based cryptography, authenticated key agreement, perfect forward secrecy, certificateless public key cryptography |
17 | Annabelle McIver, Carroll C. Morgan |
Sums and Lovers: Case Studies in Security, Compositionality and Refinement. |
FM |
2009 |
DBLP DOI BibTeX RDF |
Refinement of security, formalised secrecy, hierarchical security reasoning, compositional semantics |
17 | Zhiyao Liang, Rakesh M. Verma |
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
insecurity, Cryptographic protocols, secrecy, NP |
17 | Reiner Dojen, Vladimir Pasca, Tom Coffey |
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack |
17 | Chunyong Yin, Ruxia Sun, Shuoben Bi |
A Method of Automatic Key Generation Based on Handwriting. |
SNPD |
2009 |
DBLP DOI BibTeX RDF |
personal characteristic, algorithm, handwriting, secrecy, key generation |
17 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. |
UIC |
2009 |
DBLP DOI BibTeX RDF |
Master key forward secrecy, Provable security, Weil pairing, Authenticated key agreement |
17 | Hongfeng Zhu, Tianhua Liu, Jie Liu |
Robust and Simple Multi-server Authentication Protocol without Verification Table. |
HIS (3) |
2009 |
DBLP DOI BibTeX RDF |
password authentication protocol, Smart card, Forward Secrecy, multi-server |
17 | Mengbo Hou, Qiuliang Xu, Tao Ban |
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy |
17 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of RFID Security Method with Ownership Transfer. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack |
17 | Bin Dai 0003, Yuan Luo 0003, A. J. Han Vinck |
Wiretap Channel with Side Information from Part of Encoder. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
wiretap channel, perfect secrecy, side information |
17 | Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu |
Cryptographically verified implementations for TLS. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
verified implementations, authentication, cryptographic protocols, SSL, TLS, secrecy |
17 | Diana Berbecaru, Luca Albertalli |
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
generic FSS schemes, double cache technique, backward secrecy |
17 | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan |
Managing the risk of covert information flows in virtual machine systems. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
chinese wall policy, information flow secrecy, covert channels |
17 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
17 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Secure off-the-record messaging. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
authentication, instant messaging, deniability, perfect forward secrecy |
17 | Alfred Kobsa, Jörg Schreck |
Privacy through pseudonymity in user-adaptive systems. |
ACM Trans. Internet Techn. |
2003 |
DBLP DOI BibTeX RDF |
Chaum mix, security, privacy, access control, personalization, User modeling, anonymity, encryption, reference model, pseudonymity, secrecy, personal information, KQML, user-adaptive systems |
17 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Secure program partitioning. |
ACM Trans. Comput. Syst. |
2002 |
DBLP DOI BibTeX RDF |
mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading |
17 | Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner |
Secure password-based cipher suite for TLS. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel |
17 | Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung |
Perfectly Secure Message Transmission |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
faulty communication lines, secure message transmission, perfectly secure communication, perfect secrecy, perfect resiliency, connectivity, efficient algorithms, network diameter, faulty processors, general network, worst case time |
17 | Dennie Van Tassel |
Advanced cryptographic techniques for computer. |
Commun. ACM |
1969 |
DBLP DOI BibTeX RDF |
confidential information processing, secrecy systems, cryptanalysis, security systems, ciphers, cryptographic |
11 | Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Mark F. Flanagan |
Transmitter Selection for Secrecy in Frequency-Selective Fading With Multiple Eavesdroppers and Wireless Backhaul Links. |
IEEE Trans. Veh. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Himanshu Sharma, Neeraj Kumar 0001, Rajkumar Tekchandani |
SecBoost: Secrecy-Aware Deep Reinforcement Learning Based Energy-Efficient Scheme for 5G HetNets. |
IEEE Trans. Mob. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Dawei Wang 0001, Menghan Wu, Zhongxiang Wei, Keping Yu, Lingtong Min, Shahid Mumtaz |
Uplink Secrecy Performance of RIS-Based RF/FSO Three-Dimension Heterogeneous Networks. |
IEEE Trans. Wirel. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Naeem Uz Zaman, Khalid Munawar, Muhammad Moinuddin, Ahmad Kamal Hassan, Ubaid M. Al-Saggaf |
Sum Capacity-Based Modeling and Secrecy Analysis of MISO-NOMA Cooperative IoT Framework. |
IEEE Open J. Commun. Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Kiran Kumar Godugu, Suseela Vappangi |
Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
11 | P. P. Hema, A. V. Babu 0001 |
Physical Layer Secrecy Performance Analysis of Jamming-Assisted Overlay Cognitive NOMA Networks With Hardware Impairments and Multiple Non-Colluding Eavesdroppers. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Li Ping Qian 0001, Mingqing Li, Ping Ye, Qian Wang, Bin Lin 0001, Yuan Wu 0001, Xiaoniu Yang |
Secrecy-Driven Energy Minimization in Federated-Learning-Assisted Marine Digital Twin Networks. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zhisheng Yin, Nan Cheng, Yunchao Song, Yilong Hui, Yunhan Li, Tom H. Luan, Shui Yu 0001 |
UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang 0001, Tarik Taleb |
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jianchao Zheng, Qi Zhang 0002 |
Secrecy Outage Probability of Multiple-Input-Multiple-Output Secure Internet of Things Communication Systems. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yanyan Shen, Chun-Jie Wang, Weilin Zang, Liang Xue, Bo Yang 0006, Xinping Guan |
Outage Constrained Max-Min Secrecy Rate Optimization for IRS-Aided SWIPT Systems With Artificial Noise. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef, Essam Ghadafi |
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Haitham S. Khallaf, Sherief Hashima, Mohamed Rihan, Ehab Mahmoud Mohamed, Hossam M. Kasem |
Quantifying Impact of Pointing Errors on Secrecy Performance of UAV-Based Relay-Assisted FSO Links. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef |
SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Masoud Kaveh, Zheng Yan 0002, Riku Jäntti |
Secrecy Performance Analysis of RIS-Aided Smart Grid Communications. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yebo Gu, Tao Shen 0004, Jian Song, Qingbo Wang |
Enhancing Secrecy Capacity With Non-Orthogonal Artificial Noise Based on Pilot Information Codebook. |
IEEE Wirel. Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Toan-Van Nguyen, Thai-Hoc Vu, Thien Huynh-The, Daniel Benevides da Costa |
Secrecy Performance of Short-Packet Communications in MultiHop IoT Networks With Imperfect CSI. |
IEEE Wirel. Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shaobo Jia, Rong Wang, Yao Xu, Yi Lou, Di Zhang 0002, Takuro Sato |
Secrecy Analysis of ABCom-Based Intelligent Transportation Systems With Jamming. |
IEEE Trans. Intell. Transp. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sergey Loyka, Neri Merhav |
The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help. |
IEEE Trans. Inf. Theory |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus |
Secrecy Gain of Formally Unimodular Lattices From Codes Over the Integers Modulo 4. |
IEEE Trans. Inf. Theory |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Krati Dubey, Sudhakar Pandey, Sanjay Kumar |
Secrecy-enabled resource allocation in cloud-assisted IoT networks. |
Trans. Emerg. Telecommun. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Muhammad Farooq, Le-Nam Tran, Fatemeh Golpayegani, Nima Afraz |
On the Sum Secrecy Rate Maximisation for Wireless Vehicular Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yingjie Pei, Xinwei Yue, Chongwen Huang, Zhiping Lu |
Secrecy Performance Analysis of RIS Assisted Ambient Backscatter Communication Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 4070 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|