全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. CRYPTO-MINE: CRYPTANALYSIS VIA MUTUAL INFORMATION NEURAL ESTIMATION NSTL国家科技图书文献中心

Benjamin D. Kim |  Vipindev Adat Vasude...... -  《ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2024), Vol.7: Seoul, South Korea.14-19 April 2024》 -  IEEE International Conference on Acoustics, Speech and Signal Processing - 2024, - 4820~4824 - 共5页

摘要: provide individual secrecy and study the relationship | The use of Mutual Information (MI) as a |  measure to evaluate the efficiency of cryptosystems has |  an extensive history. However, estimating MI |  between unknown random variables in a high-dimensional
关键词: Mutual Information |  Cryptography |  Individual Secrecy |  Input Distribution |  Machine Learning

2. The Gaussian Multiple Access Wiretap Channel With Selfish Transmitters: A Coalitional Game Theory Perspective NSTL国家科技图书文献中心

Rémi A. Chou |  Aylin Yener -  《IEEE Transactions on Information Theory》 - 2024,70(10) - 7432~7446 - 共15页

摘要: maximizing their individual secrecy rate. The question then |  their individual secrecy rate by participating in a | , and achievable secrecy rate allocation is determined | , stable, and achievable secrecy rate allocation is | This paper considers the Gaussian multiple
关键词: Transmitters |  Jamming |  Wireless networks |  Surveillance |  Oral communication |  Forensics |  Eavesdropping

3. Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks NSTL国家科技图书文献中心

Tong-Xing Zheng |  Xin Chen... -  《IEEE Transactions on Communications》 - 2024,72(4) - 2152~2165 - 共14页 - 被引量:2

摘要: eavesdropper. The secrecy outage probability (SOP) is adopted |  as a secrecy performance metric of the computation |  subject to an individual SOP constraint for each user |  computing bits, the transmit power, the secrecy code rates | Multi-access edge computing (MEC) has been
关键词: Task analysis |  NOMA |  Energy consumption |  Decoding |  Communication system security |  Minimization |  Resource management

4. Energy-efficient physical layer security schemes for low Earth orbit satellite systems NSTL国家科技图书文献中心

Satya Chan |  Sooyoung Kim... -  《International journal of satellite communications and networking》 - 2024,42(5) - 374~396 - 共23页

摘要: improved secrecy rates compared to the individual |  legitimate user. The secrecy performance simulation results | This paper introduces four proposals to |  enhance physical layer security (PLS) in low Earth orbit |  (LEO) satellite systems. The first proposal leverages
关键词: artificial noise |  LEO satellite |  PLS |  RIS |  security

5. Interference-Based and Deep-Learning-Aided Physical Layer Security Enhancement in Uplink NOMA Under Cooperative Eavesdropping NSTL国家科技图书文献中心

Fernando Moya Cacere... |  Sithamparanathan Kan...... -  《IEEE Transactions on Vehicular Technology》 - 2024,73(10) - 15227~15238 - 共12页

摘要: Cancellation (SIC) decoding order has over the system secrecy |  rate. Each NOMA user is subject to an individual |  decoding order has on the secrecy performance, and the | Physical Layer Security (PLS) for Uplink Non | -Orthogonal Multiple Access (UL-NOMA) is investigated, under
关键词: NOMA |  Security |  Uplink |  Decoding |  MIMO communication |  Downlink |  Resource management

6. Enabling secure authentication using fingerprint and visual cryptography NSTL国家科技图书文献中心

Annappanavar, Sneha ... |  Chavan, Pallavi Vija... -  《International Journal of Biometrics》 - 2024,16(6) - 614~639 - 共26页

摘要: associated with an individual that helps in unique |  authorisation. However, maintaining the secrecy of fingerprint | Biometrics is the form of information |  identification and verification at different platforms. The |  fingerprint is an important biometric information and has
关键词: biometrics |  fingerprint recognition |  confidentiality |  authentication |  visual cryptography |  secret sharing |  shares

7. Dark knights: Exploring resilience and hidden workarounds in commercial aviation through mixed methods NSTL国家科技图书文献中心

Riana Steen |  James E. Norman... -  《Safety science》 - 2024,175 - 106498-1~106498-14 - 共14页 - 被引量:2

摘要:, cynicism, and secrecy, contributing to a disconnect |  individual factors rather than systemic factors, iv | In this study, the duality of adaptive |  capacity in aviation safety is examined, where the need |  for resilience of frontline workers conflicts with
关键词: Adaptive capacity |  Aviation safety |  Human factors |  Resilience |  Responsibilization |  Workload

8. Lightweight Zero Knowledge Proof-Based Multi Access Control Schema for Smart Telehealth System NSTL国家科技图书文献中心

Wassila Lalouani |  Lloyd Emokpae -  《2024 International Conference on Smart Applications, Communications and Networking: SmartNets 2024, Harrisonburg, Virginia, USA, 28-30 May 2024》 -  International Conference on Smart Applications, Communications and Networking - 2024, - 1~6 - 共6页

摘要: backward secrecy and mutual access control. We conduct a |  by both individual and colluding actors | Smart healthcare systems play a pivotal role |  in delivering accessible medical services | , especially in remote environments where patients rely on
关键词: Access control |  Protocols |  Telemedicine |  Authentication |  Medical services |  Fingerprint recognition |  Physical unclonable function

9. "I Haven't Told Anyone but You": Experiences and Biopsychosocial Support Needs of People With Type 2 Diabetes and Binge Eating NSTL国家科技图书文献中心

Lindgreen, Pil |  Willaing, Ingrid... -  《Qualitative health research》 - 2024,34(7) - 621~634 - 共14页 - 被引量:1

摘要:-structured individual interviews (65% with females) were |  cease the secrecy. Pertinent to all themes were the | Up to 25% of people with type 2 diabetes (T2D | ) may binge eat which is almost 10 times as many as in |  the general population. Binge eating is associated
关键词: diabetes |  eating disorders |  type 2 diabetes |  binge eating |  diabetes care |  disordered eating |  user's experiences |  support needs |  binge eating disorder |  qualitative research...

10. High-Speed Quantum Key Distribution Using Dead-Time Compensated Detector Arrays NSTL国家科技图书文献中心

Shuangfeng Jiang |  Majid Safari -  《Journal of Lightwave Technology: A Joint IEEE/OSA Publication》 - 2024,42(10) - 3712~3724 - 共13页

摘要: of individual photons in discrete variable QKD |  the sifted bit rate (SBR) and secrecy key rate (SKR | There has been growing research interest in |  quantum technology in general and in quantum key |  distribution (QKD) in particular. However, the key generation
关键词: Detectors |  Photonics |  Single-photon avalanche diodes |  Protocols |  Qubit |  Security |  Receivers
检索条件Individual Secrecy
  • 检索词扩展

NSTL主题词

  • NSTL学科导航