Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Zhuojun Zhuang"'
Publikováno v:
Entropy, Vol 15, Iss 2, Pp 678-697 (2013)
In this paper, we study a new bus communication model, where two transmitters wish to send their corresponding private messages and a common message to a destination, while they also wish to send the common message to another receiver connected to th
Externí odkaz:
https://doaj.org/article/57a175bdc4e74c3293d6e61fc7755de9
Publikováno v:
IWSDA
In this paper, we study the state-dependent Gaussian wiretap channel with action encoder and noncausal state at the transmitter, which is also called the action-dependent dirty paper wiretap channel. Two lower bounds on the secrecy capacity of this m
Publikováno v:
IET Communications. 9:1068-1075
Incorporating information security and error correction in network coding, which has various applications in communication theory, for example, secret key sharing through a network, is of special interest and has been widely studied. To make a more i
Publikováno v:
Entropy, Vol 15, Iss 2, Pp 678-697 (2013)
Entropy
Volume 15
Issue 2
Pages 678-697
Entropy
Volume 15
Issue 2
Pages 678-697
In this paper, we study a new bus communication model, where two transmitters wish to send their corresponding private messages and a common message to a destination, while they also wish to send the common message to another receiver connected to th
Publikováno v:
Designs, Codes and Cryptography. 72:219-247
Relative dimension/length profile (RDLP), inverse relative dimension/length profile (IRDLP) and relative length/dimension profile (RLDP) are equivalent sequences of a linear code and a subcode. The concepts were applied to protect messages from an ad
Publikováno v:
Designs, Codes and Cryptography. 69:275-297
The relative generalized Hamming weight (RGHW) of a linear code C and a subcode C 1 is an extension of generalized Hamming weight. The concept was firstly used to protect messages from an adversary in the wiretap channel of type II with illegitimate
Publikováno v:
2012 IEEE 14th International Conference on Communication Technology.
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a causal manner. Inner and outer bounds are
In this paper, first, we investigate the model of degraded broadcast channel with side information and confidential messages. This work is from Steinberg's work on the degraded broadcast channel with causal and noncausal side information, and Csisz$\
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3ab954ac7006c1ec6286aa4a11138e8a
http://arxiv.org/abs/1201.2859
http://arxiv.org/abs/1201.2859
Publikováno v:
ISIT
The non-degraded wiretap channel with noiseless feedback is first investigated by R. Ahlswede and N. Cai, where lower and upper bounds on the secrecy capacity are provided in their work. However, the capacity-equivocation region has not been determin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d18d12dac058af29d0e29d23f59b2bdf
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=84867543201
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=84867543201
Publikováno v:
2011 IEEE 13th International Conference on Communication Technology.
In practical wireless communication systems, optimum distance profile (ODP) is useful in the coding schemes, such as the coding of the transport format combination indicator (TFCI) in WCDMA and the channel quality indicator (CQI) in LTE. For an arbit