Articles with "secret key" as a keyword



Photo from wikipedia

An IWT based blind and robust image watermarking scheme using secret key matrix

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-4986-1

Abstract: In this paper, the authors have proposed a binary watermark embedding approach for protecting the copyright ownership of the gray-scale images. The proposed watermark embedding process is realized in integer wavelet transform (IWT) domain to… read more here.

Keywords: watermark; image; key matrix; scheme ... See more keywords
Photo by hudsoncrafted from unsplash

Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret Key Aided Schemes

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2893801

Abstract: We investigate the physical-layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate… read more here.

Keywords: artificial noise; secret key; alices bob; security ... See more keywords
Photo by wtrsnvc from unsplash

Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2915378

Abstract: Quantum key distribution (QKD) promises to deliver secure keys, which can be applied for security demands in optical networks by using cost-efficient and scalable lightpaths. To achieve such secure communication, the QKD integrated with optical… read more here.

Keywords: optical networks; integrated optical; qkd integrated; secret key ... See more keywords
Photo from wikipedia

Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2970147

Abstract: Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance. Civil and military applications are using them extensively… read more here.

Keywords: multi party; secret key; key acquisition; ieee 802 ... See more keywords
Photo by hudsoncrafted from unsplash

Secret Key Generation With Multiantenna Relays

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3239299

Abstract: One effective way of generating and distributing secret keys for secure communication is to exploit the randomness of wireless channels. Since a potential eavesdropper has a different propagation channel than two legitimate users, it can… read more here.

Keywords: secret key; multiantenna relays; generation multiantenna; key generation ... See more keywords
Photo from wikipedia

Secret Key Generation Between Ambient Backscatter Devices

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3243063

Abstract: We analyze secret key generation between ambient backscatter devices where the channel between an ambient transmitter and the backscatter devices is used as a source of randomness. The devices do not need to estimate or… read more here.

Keywords: secret key; key; key generation; backscatter devices ... See more keywords
Photo by hudsoncrafted from unsplash

Scalable Secret Key Generation for Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3198521

Abstract: Future sensor networks require energy and bandwidth efficient designs to support the growing number of nodes. The security aspect is often neglected due to the extra computational burden imposed on the sensor nodes. In this… read more here.

Keywords: secret key; wireless; sensor; key generation ... See more keywords
Photo by alvarordesign from unsplash

Double-Layered Random Coding for Secret Key Generation in Gaussian Wiretap Channels

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2019.2961904

Abstract: Most of the existing information-theoretic secure key generation schemes have characterized maximum achievable secrecy rate or secrecy capacity over noiseless public broadcast channels. However, in many practical systems even legitimate nodes have to communicate over… read more here.

Keywords: wiretap channels; generation; gaussian wiretap; secret key ... See more keywords
Photo by hudsoncrafted from unsplash

Security of Binary Modulated Continuous Variable Quantum Key Distribution Using Optimally Displaced Threshold Detection

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2020.3048266

Abstract: Continuous variable quantum key distribution attracts increasing attention in recent years due to its potential high secret key rates and the compatibility with existing communication infrastructure. This letter derives the secret key rate for a… read more here.

Keywords: key distribution; continuous variable; quantum key; variable quantum ... See more keywords
Photo by hudsoncrafted from unsplash

A Multi-Eavesdropper Scheme Against RIS Secured LoS-Dominated Channel

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3166239

Abstract: Reconfigurable intelligent surface (RIS) has been shown as a promising technique to increase the channel randomness for secret key generation (SKG) in low-entropy channels (e.g., static or line-of-sight (LoS)), without small-scale fading. In this letter,… read more here.

Keywords: secret key; ris secured; scheme ris; ris ... See more keywords
Photo by hudsoncrafted from unsplash

Secret Key Generation by Continuous Encryption Before Quantization

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3184253

Abstract: Secret key generation (SKG) is a fundamental signal processing problem for security applications including wireless network security and biometric template security. For SKG, a pair (or more) of highly correlated secret vectors (SVs) need to… read more here.

Keywords: secret key; encryption quantization; continuous encryption; quantization ... See more keywords