16   Artículos

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng    
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ziwei Yuan, Yanping Yang, Dong Wang and Xiaoping Ma    
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platforms to assist air-to-ground cooperative communication. This paper investigates a joint safety information interaction scheme for a UAV-enabled network, wh... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Thanh-Nam Tran, Van-Cuu Ho, Thoai Phu Vo, Khanh Ngo Nhu Tran and Miroslav Voznak    
The requirements of low latency, low cost, less energy consumption, high flexibility, high network capacity, and high data safety are crucial challenges for future Internet of Things (IoT) wireless networks. Motivated by these challenges, this study deal... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yuan Ren, Yixuan Tan, Meruyert Makhanbet and Xuewei Zhang    
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-dupl... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xin Song, Lin Xia, Siyang Xu and Yue Wang    
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assis... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Carla E. Garcia, Mario R. Camana and Insoo Koo    
Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternati... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ning Du, Fasheng Liu and Yan Zang    
Due to the broadcast nature of wireless media, all nodes in the coverage of a transmitter are capable of capturing its signals, thus wireless transmission is sensitive to wiretapping. Several existing schemes place an emphasis on secrecy rate improvement... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Weijia Lei and Meihui Zhan    
-
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »