DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 153
1.
  • Wiretap Channels: Nonasympt... Wiretap Channels: Nonasymptotic Fundamental Limits
    Yang, Wei; Schaefer, Rafael F.; Poor, H. Vincent IEEE transactions on information theory, 07/2019, Letnik: 65, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    This paper investigates the maximal secret communication rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • Physical Layer Secret Key G... Physical Layer Secret Key Generation in Static Environments
    Aldaghri, Nasser; Mahdavifar, Hessam IEEE transactions on information forensics and security, 2020, Letnik: 15
    Journal Article
    Recenzirano
    Odprti dostop

    Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use such keys for ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • Semantically Secure Lattice... Semantically Secure Lattice Codes for the Gaussian Wiretap Channel
    Cong Ling; Luzzi, Laura; Belfiore, Jean-Claude ... IEEE transactions on information theory, 10/2014, Letnik: 60, Številka: 10
    Journal Article
    Recenzirano

    We propose a new scheme of wiretap lattice coding that achieves semantic security and strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the flatness factor, ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • Secure Batch Deduplication ... Secure Batch Deduplication without Dual Servers in Backup System
    Zheng, Haoyu; Zeng, Shengke; Li, Hongwei ... IEEE transactions on dependable and secure computing, 2024
    Journal Article

    Cloud storage provides highly available and low cost resources to users. However, as massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is necessary. This is a ...
Celotno besedilo
Dostopno za: CEKLJ, UL
5.
  • Semantic-Security Capacity ... Semantic-Security Capacity for Wiretap Channels of Type II
    Goldfeld, Ziv; Cuff, Paul; Permuter, Haim H. IEEE transactions on information theory, 2016-July, 2016-7-00, 20160701, Letnik: 62, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • Wiretap Channels With Rando... Wiretap Channels With Random States Non-Causally Available at the Encoder
    Goldfeld, Ziv; Cuff, Paul; Permuter, Haim H. IEEE transactions on information theory, 2020-March, 2020-3-00, Letnik: 66, Številka: 3
    Journal Article
    Recenzirano

    We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all instances of CSI availability as special cases, and ...
Celotno besedilo
Dostopno za: UL

PDF
7.
  • Cloud storage auditing with... Cloud storage auditing with deduplication supporting different security levels according to data popularity
    Hou, Huiying; Yu, Jia; Hao, Rong Journal of network and computer applications, 05/2019, Letnik: 134
    Journal Article
    Recenzirano

    The public cloud storage auditing with deduplication is proposed to check the integrity of cloud data under the condition that the cloud stores only a single copy of the same file from different ...
Celotno besedilo
Dostopno za: UL
8.
  • Semantic security against w... Semantic security against web application attacks
    Razzaq, Abdul; Latif, Khalid; Ahmad, H. Farooq ... Information sciences, 01/2014, Letnik: 254
    Journal Article
    Recenzirano

    In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based security methods, our solution is an ontology based technique. It ...
Celotno besedilo
Dostopno za: UL
9.
  • Semantic Security via Seede... Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs
    Wiese, Moritz; Boche, Holger IEEE transactions on information theory, 2021-Jan., 2021-1-00, Letnik: 67, Številka: 1
    Journal Article
    Recenzirano

    A novel type of functions called biregular irreducible functions is introduced and applied as security components (instead of, e.g., universal hash functions) in seeded modular wiretap coding ...
Celotno besedilo
Dostopno za: UL

PDF
10.
  • Lightweight Searchable Publ... Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
    Peng Xu; Shuanghong He; Wei Wang ... IEEE transactions on industrial informatics, 08/2018, Letnik: 14, Številka: 8
    Journal Article
    Odprti dostop

    The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of ...
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 153

Nalaganje filtrov