Zobrazeno 1 - 10
of 509
pro vyhledávání: '"McLaughlin, P W"'
The causal connectivity of a network is often inferred to understand the network function. It is arguably acknowledged that the inferred causal connectivity relies on causality measure one applies, and it may differ from the network's underlying stru
Externí odkaz:
http://arxiv.org/abs/2110.09521
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
McLaughlin, Thomas W.
Starting from the Lovelock action and its supplementation by the relevant Gibbons-Hawking-York boundary term, the curvature action corresponding to second-order General Relativity is stated in accordance to the topological properties of the space-tim
Externí odkaz:
http://arxiv.org/abs/1206.0947
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an atta
Externí odkaz:
http://arxiv.org/abs/1102.3641
In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this no
Externí odkaz:
http://arxiv.org/abs/1102.3173
For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs. When the DDP has minimum left degree at least three,
Externí odkaz:
http://arxiv.org/abs/1009.3130
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive
Externí odkaz:
http://arxiv.org/abs/0905.0440
This paper considers the problem of perfectly secure communication on a modified version of Wyner's wiretap channel II where both the main and wiretapper's channels have some erasures. A secret message is to be encoded into $n$ channel symbols and tr
Externí odkaz:
http://arxiv.org/abs/0902.3286
In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the
Externí odkaz:
http://arxiv.org/abs/0901.0275