Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Secrecy Capacity). Showing records 1 – 16 of 16 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Australian National University

1. He, Biao. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .

Degree: 2016, Australian National University

 The current research on physical layer security is far from implementations in practical networks, arguably due to impractical assumptions in the literature and the limited… (more)

Subjects/Keywords: physical layer security; wireless communications; secrecy outage probability; secrecy capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, B. (2016). Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . (Thesis). Australian National University. Retrieved from http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Thesis, Australian National University. Accessed January 17, 2020. http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

He, Biao. “Wireless Physical Layer Security: Towards Practical Assumptions and Requirements .” 2016. Web. 17 Jan 2020.

Vancouver:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Internet] [Thesis]. Australian National University; 2016. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1885/104995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

He B. Wireless Physical Layer Security: Towards Practical Assumptions and Requirements . [Thesis]. Australian National University; 2016. Available from: http://hdl.handle.net/1885/104995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Chen, Sin-Fong. Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System.

Degree: Master, Communications Engineering, 2012, NSYSU

 For wireless communication systems, due to broadcasting nature of wireless medium, how to keep eavesdroppers from wiretapping messages is worth investigated. In addition to encryption… (more)

Subjects/Keywords: multiple-input multiple-output (MIMO); precoder optimization; physical layer secrecy; Cooperative communication; secrecy capacity.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, S. (2012). Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828112-173135

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Sin-Fong. “Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System.” 2012. Thesis, NSYSU. Accessed January 17, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828112-173135.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Sin-Fong. “Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System.” 2012. Web. 17 Jan 2020.

Vancouver:

Chen S. Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Jan 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828112-173135.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen S. Jointly Precoder Design with Wiretapping Relay for an Amplify-and-Forward MIMO System. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828112-173135

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

3. Abdelaziz, Amr Mohamed. Information Theoretical Studies on MIMO Channel with Limited Channel State Information.

Degree: PhD, Electrical and Computer Engineering, 2017, The Ohio State University

 Tremendous increase in throughput, reliability and security requirements in present and future wireless communication networks necessitates the migration towards the underutilized higher frequency bands. The… (more)

Subjects/Keywords: Communication; Electrical Engineering; Information Science; Information Theory; Secrecy Capacity; Transmitter Optimization; Limited CSI; Delay Limited Secrecy Capacity; Ergodic Secrecy Capacity; Covert MIMO Communication; Physical Layer Authentication; Jamming Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdelaziz, A. M. (2017). Information Theoretical Studies on MIMO Channel with Limited Channel State Information. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914

Chicago Manual of Style (16th Edition):

Abdelaziz, Amr Mohamed. “Information Theoretical Studies on MIMO Channel with Limited Channel State Information.” 2017. Doctoral Dissertation, The Ohio State University. Accessed January 17, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914.

MLA Handbook (7th Edition):

Abdelaziz, Amr Mohamed. “Information Theoretical Studies on MIMO Channel with Limited Channel State Information.” 2017. Web. 17 Jan 2020.

Vancouver:

Abdelaziz AM. Information Theoretical Studies on MIMO Channel with Limited Channel State Information. [Internet] [Doctoral dissertation]. The Ohio State University; 2017. [cited 2020 Jan 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914.

Council of Science Editors:

Abdelaziz AM. Information Theoretical Studies on MIMO Channel with Limited Channel State Information. [Doctoral Dissertation]. The Ohio State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1500592938716914


University of Notre Dame

4. Ebrahim MolavianJazi. Secure Communications over Arbitrarily Varying Wiretap Channels</h1>.

Degree: MSin Electrical Engineering, Electrical Engineering, 2009, University of Notre Dame

  In this thesis, we consider a class of information protection problems requiring confidentiality (secrecy) from eavesdropping and integrity (reliability) from jamming in an information-theoretic… (more)

Subjects/Keywords: confidentiality; Information protection; arbitrarily varying channel.; secrecy capacity; wiretap channel; jamming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MolavianJazi, E. (2009). Secure Communications over Arbitrarily Varying Wiretap Channels</h1>. (Masters Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/3t945q49p1f

Chicago Manual of Style (16th Edition):

MolavianJazi, Ebrahim. “Secure Communications over Arbitrarily Varying Wiretap Channels</h1>.” 2009. Masters Thesis, University of Notre Dame. Accessed January 17, 2020. https://curate.nd.edu/show/3t945q49p1f.

MLA Handbook (7th Edition):

MolavianJazi, Ebrahim. “Secure Communications over Arbitrarily Varying Wiretap Channels</h1>.” 2009. Web. 17 Jan 2020.

Vancouver:

MolavianJazi E. Secure Communications over Arbitrarily Varying Wiretap Channels</h1>. [Internet] [Masters thesis]. University of Notre Dame; 2009. [cited 2020 Jan 17]. Available from: https://curate.nd.edu/show/3t945q49p1f.

Council of Science Editors:

MolavianJazi E. Secure Communications over Arbitrarily Varying Wiretap Channels</h1>. [Masters Thesis]. University of Notre Dame; 2009. Available from: https://curate.nd.edu/show/3t945q49p1f


Penn State University

5. Tekin, Ender. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels.

Degree: PhD, Electrical Engineering, 2008, Penn State University

 The widespread use of multiuser wireless communications has been raising the demand for higher data rates and until now that has been the main design… (more)

Subjects/Keywords: wire-tap channel; secrecy capacity; wireless communications; information theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tekin, E. (2008). Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8415

Chicago Manual of Style (16th Edition):

Tekin, Ender. “Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels.” 2008. Doctoral Dissertation, Penn State University. Accessed January 17, 2020. https://etda.libraries.psu.edu/catalog/8415.

MLA Handbook (7th Edition):

Tekin, Ender. “Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels.” 2008. Web. 17 Jan 2020.

Vancouver:

Tekin E. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2020 Jan 17]. Available from: https://etda.libraries.psu.edu/catalog/8415.

Council of Science Editors:

Tekin E. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8415


University of Ottawa

6. Urlea, Maria. Numerical Optimization Techniques for Secure Communications Over MIMO Channels .

Degree: 2014, University of Ottawa

 As multimedia applications become more popular, wireless communication systems are expected to reliably provide increased data rates. Multiple Input Multiple Output (MIMO) technologies can meet… (more)

Subjects/Keywords: Secrecy capacity; Physical layer secutiry; Renk-adaptive monte-carlo

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Urlea, M. (2014). Numerical Optimization Techniques for Secure Communications Over MIMO Channels . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/31859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Urlea, Maria. “Numerical Optimization Techniques for Secure Communications Over MIMO Channels .” 2014. Thesis, University of Ottawa. Accessed January 17, 2020. http://hdl.handle.net/10393/31859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Urlea, Maria. “Numerical Optimization Techniques for Secure Communications Over MIMO Channels .” 2014. Web. 17 Jan 2020.

Vancouver:

Urlea M. Numerical Optimization Techniques for Secure Communications Over MIMO Channels . [Internet] [Thesis]. University of Ottawa; 2014. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/10393/31859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Urlea M. Numerical Optimization Techniques for Secure Communications Over MIMO Channels . [Thesis]. University of Ottawa; 2014. Available from: http://hdl.handle.net/10393/31859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

7. El-Halabi, Mustapha. Physical-Layer Security: Wide-band Communications & Role of Known Interference.

Degree: 2013, Texas A&M University

 Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security… (more)

Subjects/Keywords: Physical layer security; wiretap channel; secrecy capacity; capacity per unit cost; linear deterministic model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El-Halabi, M. (2013). Physical-Layer Security: Wide-band Communications & Role of Known Interference. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/151822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Thesis, Texas A&M University. Accessed January 17, 2020. http://hdl.handle.net/1969.1/151822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

El-Halabi, Mustapha. “Physical-Layer Security: Wide-band Communications & Role of Known Interference.” 2013. Web. 17 Jan 2020.

Vancouver:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Internet] [Thesis]. Texas A&M University; 2013. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1969.1/151822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

El-Halabi M. Physical-Layer Security: Wide-band Communications & Role of Known Interference. [Thesis]. Texas A&M University; 2013. Available from: http://hdl.handle.net/1969.1/151822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

8. Gopala, Praveen Kumar. Feedback in wireless networks: cross-layer design, secrecy and reliability.

Degree: PhD, Electrical Engineering, 2007, The Ohio State University

 The central theme of this dissertation is the impact of feedback on the performance of wireless networks. Wireless channels offer a multitude of new challenges… (more)

Subjects/Keywords: Wireless communications; cross-layer design; multicast; scheduling; power control; secrecy capacity; error exponents; cooperation.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gopala, P. K. (2007). Feedback in wireless networks: cross-layer design, secrecy and reliability. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1189452535

Chicago Manual of Style (16th Edition):

Gopala, Praveen Kumar. “Feedback in wireless networks: cross-layer design, secrecy and reliability.” 2007. Doctoral Dissertation, The Ohio State University. Accessed January 17, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1189452535.

MLA Handbook (7th Edition):

Gopala, Praveen Kumar. “Feedback in wireless networks: cross-layer design, secrecy and reliability.” 2007. Web. 17 Jan 2020.

Vancouver:

Gopala PK. Feedback in wireless networks: cross-layer design, secrecy and reliability. [Internet] [Doctoral dissertation]. The Ohio State University; 2007. [cited 2020 Jan 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1189452535.

Council of Science Editors:

Gopala PK. Feedback in wireless networks: cross-layer design, secrecy and reliability. [Doctoral Dissertation]. The Ohio State University; 2007. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1189452535


Texas A&M University

9. Balasubramanian, Anantharaman. On Resource Allocation for Communication Systems with Delay and Secrecy Constraints.

Degree: 2011, Texas A&M University

 This dissertation studies fundamental limits of modern digital communication systems in presence/absence of delay and secrecy constraints. In the first part of this dissertation, we… (more)

Subjects/Keywords: Rate region; User-cooperation; Time-division multiple access; Effective capacity; Diversity coding; Secrecy; Cognitive radio; Quality of service; Scheduling.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balasubramanian, A. (2011). On Resource Allocation for Communication Systems with Delay and Secrecy Constraints. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Balasubramanian, Anantharaman. “On Resource Allocation for Communication Systems with Delay and Secrecy Constraints.” 2011. Thesis, Texas A&M University. Accessed January 17, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Balasubramanian, Anantharaman. “On Resource Allocation for Communication Systems with Delay and Secrecy Constraints.” 2011. Web. 17 Jan 2020.

Vancouver:

Balasubramanian A. On Resource Allocation for Communication Systems with Delay and Secrecy Constraints. [Internet] [Thesis]. Texas A&M University; 2011. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Balasubramanian A. On Resource Allocation for Communication Systems with Delay and Secrecy Constraints. [Thesis]. Texas A&M University; 2011. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Akron

10. Dang, Cuong Hung. Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference.

Degree: MSin Engineering, Electrical Engineering, 2015, University of Akron

 Due to the broadcast nature of wireless channels, security and privacy are of utmost concern for future wireless technologies. However, securely transferring confidentialinformation over a… (more)

Subjects/Keywords: Electrical Engineering; Amplify-and-forward; full-duplex; relay channel; residual self-interference; secrecy capacity; wire-tap channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dang, C. H. (2015). Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference. (Masters Thesis). University of Akron. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=akron1450452497

Chicago Manual of Style (16th Edition):

Dang, Cuong Hung. “Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference.” 2015. Masters Thesis, University of Akron. Accessed January 17, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=akron1450452497.

MLA Handbook (7th Edition):

Dang, Cuong Hung. “Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference.” 2015. Web. 17 Jan 2020.

Vancouver:

Dang CH. Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference. [Internet] [Masters thesis]. University of Akron; 2015. [cited 2020 Jan 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=akron1450452497.

Council of Science Editors:

Dang CH. Optimal Power Allocation and Secrecy Capacity of The Full-Duplex Amplify-and-Forward Wire-tap Relay Channel Under Residual Self-Interference. [Masters Thesis]. University of Akron; 2015. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=akron1450452497


Syracuse University

11. Zou, Shaofeng. Nonparametric Anomaly Detection and Secure Communication.

Degree: PhD, Electrical Engineering and Computer Science, 2016, Syracuse University

  Two major security challenges in information systems are detection of anomalous data patterns that reflect malicious intrusions into data storage systems and protection of… (more)

Subjects/Keywords: degraded broadcast channel; distribution-free test; kernel mean embedding; nonparametric anomaly detection; secrecy capacity region; secure communication; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, S. (2016). Nonparametric Anomaly Detection and Secure Communication. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/467

Chicago Manual of Style (16th Edition):

Zou, Shaofeng. “Nonparametric Anomaly Detection and Secure Communication.” 2016. Doctoral Dissertation, Syracuse University. Accessed January 17, 2020. https://surface.syr.edu/etd/467.

MLA Handbook (7th Edition):

Zou, Shaofeng. “Nonparametric Anomaly Detection and Secure Communication.” 2016. Web. 17 Jan 2020.

Vancouver:

Zou S. Nonparametric Anomaly Detection and Secure Communication. [Internet] [Doctoral dissertation]. Syracuse University; 2016. [cited 2020 Jan 17]. Available from: https://surface.syr.edu/etd/467.

Council of Science Editors:

Zou S. Nonparametric Anomaly Detection and Secure Communication. [Doctoral Dissertation]. Syracuse University; 2016. Available from: https://surface.syr.edu/etd/467


Blekinge Institute of Technology

12. Padala, Akhila Naga Sree Ravali. Performance of physical layer security with different service integrity parameters.

Degree: 2018, Blekinge Institute of Technology

  Information security has been a very important issue in wireless networks. With the ever-increasing amount of data being exchanged over wireless networks, the confidentiality… (more)

Subjects/Keywords: Physical layer security; outage probability; symbol error rate; secrecy capacity; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padala, A. N. S. R. (2018). Performance of physical layer security with different service integrity parameters. (Thesis). Blekinge Institute of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15872

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Padala, Akhila Naga Sree Ravali. “Performance of physical layer security with different service integrity parameters.” 2018. Thesis, Blekinge Institute of Technology. Accessed January 17, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15872.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Padala, Akhila Naga Sree Ravali. “Performance of physical layer security with different service integrity parameters.” 2018. Web. 17 Jan 2020.

Vancouver:

Padala ANSR. Performance of physical layer security with different service integrity parameters. [Internet] [Thesis]. Blekinge Institute of Technology; 2018. [cited 2020 Jan 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15872.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Padala ANSR. Performance of physical layer security with different service integrity parameters. [Thesis]. Blekinge Institute of Technology; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15872

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Assaf, Mounir. From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés.

Degree: Docteur es, Informatique, 2015, Rennes 1

De nos jours, les ordinateurs sont omniprésents. Tous ces ordinateurs stockent et manipulent de l'information, parfois sensible, d'où l'intérêt de protéger et de confiner la… (more)

Subjects/Keywords: Contrôle de Flux d'Information; Analyse de Programmes; Sécurité de l'Information; Non-Interférence; Quantification des Flux d'Information; Relative Secrecy; Min-Capacity; Information Flow Control; Program Analysis; Information Security; Qualitative Information Flow; Quantitative Information Flow; Non-Interference; Relative Secrecy; Min-Capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Assaf, M. (2015). From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2015REN1S003

Chicago Manual of Style (16th Edition):

Assaf, Mounir. “From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés.” 2015. Doctoral Dissertation, Rennes 1. Accessed January 17, 2020. http://www.theses.fr/2015REN1S003.

MLA Handbook (7th Edition):

Assaf, Mounir. “From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés.” 2015. Web. 17 Jan 2020.

Vancouver:

Assaf M. From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés. [Internet] [Doctoral dissertation]. Rennes 1; 2015. [cited 2020 Jan 17]. Available from: http://www.theses.fr/2015REN1S003.

Council of Science Editors:

Assaf M. From qualitative to quantitative program analysis : permissive enforcement of secure information flow : Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d’information sécurisés. [Doctoral Dissertation]. Rennes 1; 2015. Available from: http://www.theses.fr/2015REN1S003

14. Daly, Michael. Physical layer encryption using fixed and reconfigurable antennas.

Degree: PhD, 1200, 2013, University of Illinois – Urbana-Champaign

 Traditionally, antenna systems have been designed to achieve reliable wireless communication, while the problem of securing that communication from eavesdropping was left to mathematical cryptography.… (more)

Subjects/Keywords: physical layer encryption; artificial noise; reconfigurable antennas; secrecy capacity

…the secrecy rate is zero. Secrecy capacity is the supremum of all achievable secrecy rates… …Secrecy capacity bounds have been derived for multiple antennas at the transmitter, receiver… …communications involves developing implementable schemes to achieve secrecy capacity. In [19]… …have been proposed 3 [20, 21, 22], with MIMO secrecy capacity for the AWGN… …channel derived in [23] and minimum guaranteed secrecy capacity for a fading channel… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Daly, M. (2013). Physical layer encryption using fixed and reconfigurable antennas. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/42321

Chicago Manual of Style (16th Edition):

Daly, Michael. “Physical layer encryption using fixed and reconfigurable antennas.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed January 17, 2020. http://hdl.handle.net/2142/42321.

MLA Handbook (7th Edition):

Daly, Michael. “Physical layer encryption using fixed and reconfigurable antennas.” 2013. Web. 17 Jan 2020.

Vancouver:

Daly M. Physical layer encryption using fixed and reconfigurable antennas. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Jan 17]. Available from: http://hdl.handle.net/2142/42321.

Council of Science Editors:

Daly M. Physical layer encryption using fixed and reconfigurable antennas. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/42321


University of Oulu

15. Soderi, S. (Simone). Evaluation of industrial wireless communications systems’ security.

Degree: 2016, University of Oulu

Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development… (more)

Subjects/Keywords: EMC; emulator; far–field; fingerprinting; jamming; near–field; physical layer security; railway; safety; secrecy capacity; secure region; sniffer; spread spectrum; vehicle; watermarking; wireless; wiretap channel; emulaattorit; fyysisen kerroksen turvallisuus; hajaspektri; häirintä; jäljittäminen; kaukokenttä; liikennevälineet; lähikenttä; rautatiet; salakuuntelukanavat; salasanan haistelija; salauskapasiteetti; suoja–alue; sähkömagneettinen yhteensopivuus; turvallisuus; vesileimaus; HIP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soderi, S. (. (2016). Evaluation of industrial wireless communications systems’ security. (Doctoral Dissertation). University of Oulu. Retrieved from http://urn.fi/urn:isbn:9789526212463

Chicago Manual of Style (16th Edition):

Soderi, S (Simone). “Evaluation of industrial wireless communications systems’ security.” 2016. Doctoral Dissertation, University of Oulu. Accessed January 17, 2020. http://urn.fi/urn:isbn:9789526212463.

MLA Handbook (7th Edition):

Soderi, S (Simone). “Evaluation of industrial wireless communications systems’ security.” 2016. Web. 17 Jan 2020.

Vancouver:

Soderi S(. Evaluation of industrial wireless communications systems’ security. [Internet] [Doctoral dissertation]. University of Oulu; 2016. [cited 2020 Jan 17]. Available from: http://urn.fi/urn:isbn:9789526212463.

Council of Science Editors:

Soderi S(. Evaluation of industrial wireless communications systems’ security. [Doctoral Dissertation]. University of Oulu; 2016. Available from: http://urn.fi/urn:isbn:9789526212463

16. Kamel, Sarah. Sécurité pour les réseaux sans fil : Security for wireless communications.

Degree: Docteur es, Electronique et communications, 2017, Paris, ENST

Aujourd’hui, le renforcement de la sécurité des systèmes de communications devient une nécessité, par anticipation du développement des ordinateurs quantiques et des nouvelles attaques qui… (more)

Subjects/Keywords: Cryptographie sur réseau; Cryptosystème Goldrei-Goldwasser-Halevi (GGH); Chaînes de diffusion; Systèmes de mise en mémoire cache; Capacité de sécurité; Lattice-based cryptography; Goldreich-Goldwasser-Halevi cryptosystem (GGH); Broadcast channels; Caching systems; Secrecy capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamel, S. (2017). Sécurité pour les réseaux sans fil : Security for wireless communications. (Doctoral Dissertation). Paris, ENST. Retrieved from http://www.theses.fr/2017ENST0011

Chicago Manual of Style (16th Edition):

Kamel, Sarah. “Sécurité pour les réseaux sans fil : Security for wireless communications.” 2017. Doctoral Dissertation, Paris, ENST. Accessed January 17, 2020. http://www.theses.fr/2017ENST0011.

MLA Handbook (7th Edition):

Kamel, Sarah. “Sécurité pour les réseaux sans fil : Security for wireless communications.” 2017. Web. 17 Jan 2020.

Vancouver:

Kamel S. Sécurité pour les réseaux sans fil : Security for wireless communications. [Internet] [Doctoral dissertation]. Paris, ENST; 2017. [cited 2020 Jan 17]. Available from: http://www.theses.fr/2017ENST0011.

Council of Science Editors:

Kamel S. Sécurité pour les réseaux sans fil : Security for wireless communications. [Doctoral Dissertation]. Paris, ENST; 2017. Available from: http://www.theses.fr/2017ENST0011

.