Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Shah, Shahid Mehraj"'
The performance of next generation wireless systems (5G/6G and beyond) at the physical layer is primarily driven by the choice of digital modulation techniques that are bandwidth and power efficient, while maintaining high data rates. Achievable rate
Externí odkaz:
http://arxiv.org/abs/2308.11405
Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI
In this paper, we address the problem of distributed power allocation in a $K$ user fading multiple access wiretap channel, where global channel state information is limited, i.e., each user has knowledge of their own channel state with respect to Bo
Externí odkaz:
http://arxiv.org/abs/2306.09209
The Internet of Things (IoT) has altered living by controlling devices/things over the Internet. IoT has specified many smart solutions for daily problems, transforming cyber-physical systems (CPS) and other classical fields into smart regions. Most
Externí odkaz:
http://arxiv.org/abs/2207.07903
The Measurement-based quantum computation provides an alternate model for quantum computation compared to the well-known gate-based model. It uses qubits prepared in a specific entangled state followed by single-qubit measurements. The stabilizers of
Externí odkaz:
http://arxiv.org/abs/2207.04996
Publikováno v:
In Internet of Things April 2024 25
In this paper a $K$-user fading multiple access channel with and without security constraints is studied. First we consider a F-MAC without the security constraints. Under the assumption of individual CSI of users, we propose the problem of power all
Externí odkaz:
http://arxiv.org/abs/1607.01346
Autor:
Shah, Shahid Mehraj, Sharma, Vinod
We consider a two user multiple-access channel with an eavesdropper at the receiving end. We use previously transmitted messages as a key in the next slot till we achieve the capacity region of the usual Multiple Access Channel (MAC).
Comment: 6
Comment: 6
Externí odkaz:
http://arxiv.org/abs/1410.8794
We consider a wiretap channel and use previously transmitted messages to generate a secret key which increases the secrecy capacity. This can be bootstrapped to increase the secrecy capacity to the Shannon capacity without using any feedback or extra
Externí odkaz:
http://arxiv.org/abs/1404.5945
Autor:
Shah, Shahid Mehraj, Sharma, Vinod
In this paper we consider a wiretap channel with a secret key buffer. We use the coding scheme of [1] to enhance the secrecy rate to the capacity of the main channel, while storing each securely transmitted message in the secret key buffer. We use th
Externí odkaz:
http://arxiv.org/abs/1404.5701
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.