Visible to the public Biblio

Filters: Keyword is capacity  [Clear All Filters]
2020-12-15
Boche, H., Cai, M., Wiese, M., Deppe, C., Ferrara, R..  2020.  Semantic Security for Quantum Wiretap Channels. 2020 IEEE International Symposium on Information Theory (ISIT). :1990—1995.

We determine the semantic security capacity for quantum wiretap channels. We extend methods for classical channels to quantum channels to demonstrate that a strongly secure code guarantees a semantically secure code with the same secrecy rate. Furthermore, we show how to transform a non-secure code into a semantically secure code by means of biregular irreducible functions (BRI functions). We analyze semantic security for classical-quantum channels and for quantum channels.

2019-11-25
Sanjaroon, Vahideh, Motahari, Abolfazl S., Farhadi, Alireza, Khalaj, Babak. H..  2019.  Tight Bound on the Stability of Control Systems over Parallel Gaussian Channels Using a New Joint Source Channel Coding. 2019 Iran Workshop on Communication and Information Theory (IWCIT). :1–6.
In this paper, we address the stability problem of a noiseless linear time invariant control system over parallel Gaussian channels with feedback. It is shown that the eigenvalues-rate condition which has been proved as a necessary condition, is also sufficient for stability over parallel Gaussian channels. In fact, it is proved that for stabilizing a control system over the parallel Gaussian channels, it suffices that the Shannon channel capacity obtained by the water filling technique is greater than the sum of the logarithm of the unstable eigenvalues magnitude. In order to prove this sufficient condition, we propose a new nonlinear joint source channel coding for parallel Gaussian channels by which the initial state is transmitted through communication steps. This coding scheme with a linear control policy results in the stability of the system under the eigenvalues-rate condition. Hence, the proposed encoder, decoder and controller are efficient for this problem.
2018-03-26
Shi, Wenxiao, Zhang, Ruidong, Ouyang, Min, Wang, Jihong.  2017.  The Capacity of Hybrid Wireless Mesh Network. Proceedings of the 3rd International Conference on Communication and Information Processing. :332–338.

Wireless mesh network (WMN) consists of mesh gateways, mesh routers and mesh clients. In hybrid WMN, both backbone mesh network and client mesh network are mesh connected. Capacity analysis of multi-hop wireless networks has proven to be an interesting and challenging research topic. The capacity of hybrid WMN depends on several factors such as traffic model, topology, scheduling strategy and bandwidth allocation strategy, etc. In this paper, the capacity of hybrid WMN is studied according to the traffic model and bandwidth allocation. The traffic of hybrid WMN is categorized into internal and external traffic. Then the capacity of each mesh client is deduced according to appropriate bandwidth allocation. The analytical results show that hybrid WMN achieves lower capacity than infrastructure WMN. The results and conclusions can guide for the construction of hybrid WMN.

2017-12-12
Kogos, K. G., Seliverstova, E. I., Epishkina, A. V..  2017.  Review of covert channels over HTTP: Communication and countermeasures. 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). :459–462.

Many innovations in the field of cryptography have been made in recent decades, ensuring the confidentiality of the message's content. However, sometimes it's not enough to secure the message, and communicating parties need to hide the fact of the presence of any communication. This problem is solved by covert channels. A huge number of ideas and implementations of different types of covert channels was proposed ever since the covert channels were mentioned for the first time. The spread of the Internet and networking technologies was the reason for the use of network protocols for the invention of new covert communication methods and has led to the emergence of a new class of threats related to the data leakage via network covert channels. In recent years, web applications, such as web browsers, email clients and web messengers have become indispensable elements in business and everyday life. That's why ubiquitous HTTP messages are so useful as a covert information containers. The use of HTTP for the implementation of covert channels may increase the capacity of covert channels due to HTTP's flexibility and wide distribution as well. We propose a detailed analysis of all known HTTP covert channels and techniques of their detection and capacity limitation.