Buscar
Mostrando ítems 1-10 de 120
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
(2022-01-01)
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique is adopted in order to prevent ...
Secrecy Performance of Untrustworthy AF Relay Networks using Cooperative Jamming and SWIPT
(2019-09-01)
In this paper, the secrecy outage performance of a three-node amplify-and-forward relay network with an untrustworthy relay is investigated. To enable a secure transmission, we consider a destination-based jamming technique ...
Secrecy Performance of Untrustworthy AF Relay Networks using Cooperative Jamming and SWIPT
(Ieee, 2019-01-01)
In this paper, the secrecy outage performance of a three-node amplify-and-forward relay network with an untrustworthy relay is investigated. To enable a secure transmission, we consider a destination-based jamming technique ...
The Fundamental Right to Secrecy of CommunicationsEl derecho fundamental al secreto de las comunicaciones
(Pontificia Universidad Católica del Perú, 2006)
Secure Full-Duplex Wireless Power Transfer Systems with Energy-Information Correlation
(Institute of Electrical and Electronics Engineers, 2022-02)
We investigate the secrecy performance and energy-efficiency trade-offs associated to the secure communication between a full-duplex (FD) power beacon (PB) and an energy harvesting (EH) device, in the presence of an ...
Throughput maximization in multi-hop wireless networks under a secrecy constraint
(2016-11-09)
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant ...
Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter
(2016-01-01)
This paper addresses the establishment of secure communication links between Alice and Bob in the presence of an eavesdropper (Eve). The proposed scenario assumes: 1) MIMOME wiretap channel; 2) transmit antenna selection ...
Derecho al secreto y la inviolabilidad de las comunicaciones y el daño moral a la persona humana
(Universidad Inca Garcilaso de la Vega, 2018-01-26)
El derecho al secreto y a la inviolabilidad de las comunicaciones y documentos privados que se encuentra reconocido en el artículo 2 inciso 10 de la Constitución, prohíbe que sean interceptados o conocidos por terceros ...
Secrecy Performance for Multiple Untrusted Relay Networks Using Destination-Based Jamming with Direct Link
(2018-12-18)
We propose a destination-based jamming scheme for cooperative networks with multiple untrusted amplify-and-forward relays, in which the destination operates in full-duplex mode so as to enable simultaneous reception of the ...