International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with K w weak receivers and K s strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The der...
We study the security of communication between a single transmitter and many receivers in the presen...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
International audienceAn erasure broadcast network is considered with two disjoint sets of receivers...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceDegraded K-user broadcast channels (BCs) are studied when the receivers are fa...
We study the security of communication between a single transmitter and many receivers in the presen...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
International audienceAn erasure broadcast network is considered with two disjoint sets of receivers...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceDegraded K-user broadcast channels (BCs) are studied when the receivers are fa...
We study the security of communication between a single transmitter and many receivers in the presen...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...