Zobrazeno 1 - 10
of 365
pro vyhledávání: '"Khandani, Amir K."'
Autor:
Khandani, Amir K.
This article presents a novel method for establishing an information theoretically secure encryption key over wireless channels. It exploits the fact that data transmission over wireless links is accompanied by packet error, while noise terms, and th
Externí odkaz:
http://arxiv.org/abs/2402.05012
Autor:
Khandani, Amir K.
This article bridges the gap between two topics used in sharing an encryption key: (i) Key Consolidation, i.e., extracting two identical strings of bits from two information sources with similarities (common randomness). (ii) Quantum-safe Key Encapsu
Externí odkaz:
http://arxiv.org/abs/2401.16993
Autor:
Khandani, Amir K.
This work presents some novel techniques to enhance an encryption scheme motivated by classical McEliece cryptosystem. Contributions include: (1) using masking matrices to hide sensitive data, (2) allowing both legitimate parties to incorporate rando
Externí odkaz:
http://arxiv.org/abs/2401.16302
Autor:
Seifi, Ehsan, Khandani, Amir K.
The idea of Media-based Modulation (MBM) is to embed information in the variations of the transmission media (channel states). Using an RF closure with $w$ RF walls, MBM creates a set of $2^w$ select-able states for the end-to-end channel. Each state
Externí odkaz:
http://arxiv.org/abs/2202.02882
Autor:
Khandani, Amir K.
This article shows that achieving capacity region of a 2-users weak Gaussian Interference Channel (GIC) is equivalent to enlarging the core in a nested set of Polymatroids (each equivalent to capacity region of a multiple-access channel) through maxi
Externí odkaz:
http://arxiv.org/abs/2101.00790
Autor:
Khandani, Amir K.
This article shows that the set of HK constraints correspond to projecting the intersection of two multiple access channels on its sup-spaces. A key property of HK constraints is that the private message of user 1 (or of user 2) is the last layer in
Externí odkaz:
http://arxiv.org/abs/2012.07820
Autor:
Khandani, Amir K.
Computing capacity of Gaussian Interference Channel (GIC) is complex since knowledge of input distributions is needed to find the mutual information terms in closed forms, which should be optimized over input distributions and associated resource all
Externí odkaz:
http://arxiv.org/abs/2011.12981
Autor:
Farsani, Reza K., Khandani, Amir K.
The Interference Channels (ICs) represent fundamental building blocks of wireless communication networks. Despite considerable progress in network information theory, available capacity results for ICs, specifically those with more than two users, ar
Externí odkaz:
http://arxiv.org/abs/1702.05846
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bourgoin, Jean-Philippe, Gigov, Nikolay, Higgins, Brendon L., Yan, Zhizhong, Meyer-Scott, Evan, Khandani, Amir K., Lütkenhaus, Norbert, Jennewein, Thomas
Publikováno v:
Phys. Rev. A 92, 052339 (2015)
Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite
Externí odkaz:
http://arxiv.org/abs/1512.05789