Secrecy wireless information and power transfer with MISO beamforming
The dual use of radio signal for simultaneous wireless information and power transfer
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …
Cyber security attacks on smart cities and associated mobile technologies
A AlDairi - Procedia computer science, 2017 - Elsevier
Smart City refer to the city that integrates modern technologies for automated and efficient
service providing to enhance citizens' lifestyle. Latest studies show that like 60 present of the …
service providing to enhance citizens' lifestyle. Latest studies show that like 60 present of the …
Physical layer security of multiuser multirelay hybrid satellite-terrestrial relay networks
In this paper, we study the physical layer security of a downlink hybrid satellite-terrestrial
relay network (HSTRN), where a multi-antenna satellite communicates with multiple …
relay network (HSTRN), where a multi-antenna satellite communicates with multiple …
Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …
technology to improve network resource utilization. In D2D-enabled cellular networks …
LTE/SAE security issues on 4G wireless networks
The authors give an overview on the state of the art of potential security issues that occur in
the deployment of the LTE/SAE (Long-Term Evolution/System Architecture Evolution) …
the deployment of the LTE/SAE (Long-Term Evolution/System Architecture Evolution) …
Cooperative jamming for wireless physical layer security
Cooperative jamming is an approach that has been recently proposed for improving
physical layer based security for wireless networks in the presence of an eavesdropper …
physical layer based security for wireless networks in the presence of an eavesdropper …
Medical images transmission over wireless multimedia sensor networks with high data rate
This paper presents several proposed scenarios for medical image transmission over
Wireless Multimedia Sensor Networks with multi-level security tools and Unequal Error …
Wireless Multimedia Sensor Networks with multi-level security tools and Unequal Error …
High-performance ECC processor architecture design for IoT security applications
In recent years, the usage of elliptic curve cryptography (ECC) in IoT applications is steadily
increasing. The end nodes in IoT applications demand optimized device performance in …
increasing. The end nodes in IoT applications demand optimized device performance in …
Threshold visual secret sharing by random grids with improved contrast
A (k, n) visual cryptographic scheme (VCS) is a secret sharing method, which encodes a
secret image S into n share images in such a way that the stacking of any more than or …
secret image S into n share images in such a way that the stacking of any more than or …
A mobile cloud computing model using the cloudlet scheme for big data applications
The wide spread of smart phones and their capabilities made them an important part of
many people's life over the world. However, there are many challenges facing these devices …
many people's life over the world. However, there are many challenges facing these devices …