Search
Now showing items 31-40 of 48
A secure client-side framework for protecting the privacy of health data stored on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
Blind secure communication: The Secure degrees of freedom of one hop wireless networks with No CSI
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
We study a number of wireless networks with secrecy constraints and No CSI. The wiretap and MIMO broadcast channels in a presence of an external eavesdropper and the MIMO interference channel with secret messages and no ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
ICIC-Enabled Association and Channel Selection for UAV-BSS Based on User Locations and Demands
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this work, the downlink association problem is studied when inter-cell interference coordination (ICIC) is enabled at the network side. The serving base stations (BSs) are mounted over unmanned aerial vehicles (UAVs), ...
3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
(
IEEE Computer Society
, 2014 , Conference Paper)
Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ...
Association of networked flying platforms with small cells for network centric 5G+ C-RAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
5G+ systems expect enhancement in data rate and coverage area under limited power constraint. Such requirements can be fulfilled by the densification of small cells (SCs). However, a major challenge is the management of ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Epileptic seizure detection could be detected through investigating the electroencephalography (EEG), which is deemed to be very important for IoT wearable sensor-based health systems. EEG-based classification is crucial ...