Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-4986-1
Abstract: In this paper, the authors have proposed a binary watermark embedding approach for protecting the copyright ownership of the gray-scale images. The proposed watermark embedding process is realized in integer wavelet transform (IWT) domain to…
read more here.
Keywords:
watermark;
image;
key matrix;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2893801
Abstract: We investigate the physical-layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate…
read more here.
Keywords:
artificial noise;
secret key;
alices bob;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2915378
Abstract: Quantum key distribution (QKD) promises to deliver secure keys, which can be applied for security demands in optical networks by using cost-efficient and scalable lightpaths. To achieve such secure communication, the QKD integrated with optical…
read more here.
Keywords:
optical networks;
integrated optical;
qkd integrated;
secret key ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2970147
Abstract: Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance. Civil and military applications are using them extensively…
read more here.
Keywords:
multi party;
secret key;
key acquisition;
ieee 802 ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3239299
Abstract: One effective way of generating and distributing secret keys for secure communication is to exploit the randomness of wireless channels. Since a potential eavesdropper has a different propagation channel than two legitimate users, it can…
read more here.
Keywords:
secret key;
multiantenna relays;
generation multiantenna;
key generation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3243063
Abstract: We analyze secret key generation between ambient backscatter devices where the channel between an ambient transmitter and the backscatter devices is used as a source of randomness. The devices do not need to estimate or…
read more here.
Keywords:
secret key;
key;
key generation;
backscatter devices ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2022.3198521
Abstract: Future sensor networks require energy and bandwidth efficient designs to support the growing number of nodes. The security aspect is often neglected due to the extra computational burden imposed on the sensor nodes. In this…
read more here.
Keywords:
secret key;
wireless;
sensor;
key generation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2019.2961904
Abstract: Most of the existing information-theoretic secure key generation schemes have characterized maximum achievable secrecy rate or secrecy capacity over noiseless public broadcast channels. However, in many practical systems even legitimate nodes have to communicate over…
read more here.
Keywords:
wiretap channels;
generation;
gaussian wiretap;
secret key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2020.3048266
Abstract: Continuous variable quantum key distribution attracts increasing attention in recent years due to its potential high secret key rates and the compatibility with existing communication infrastructure. This letter derives the secret key rate for a…
read more here.
Keywords:
key distribution;
continuous variable;
quantum key;
variable quantum ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3166239
Abstract: Reconfigurable intelligent surface (RIS) has been shown as a promising technique to increase the channel randomness for secret key generation (SKG) in low-entropy channels (e.g., static or line-of-sight (LoS)), without small-scale fading. In this letter,…
read more here.
Keywords:
secret key;
ris secured;
scheme ris;
ris ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2022.3184253
Abstract: Secret key generation (SKG) is a fundamental signal processing problem for security applications including wireless network security and biometric template security. For SKG, a pair (or more) of highly correlated secret vectors (SVs) need to…
read more here.
Keywords:
secret key;
encryption quantization;
continuous encryption;
quantization ... See more keywords