A novel private communication framework is proposed where privacy is induced by transmitting over channel instances of linear inverse problems that are identifiable to the legitimate receiver, but unidentifiable to an eavesdropper. The gap in identifiability is created in the framework by leveraging secret knowledge between the transmitter and the legitimate receiver. Specifically, the case where the legitimate receiver harnesses a secret block structure to decode a transmitted blocksparse message from underdetermined linear measurements in conditions where classical compressed sensing would provably fail is examined. The applicability of the proposed scheme to practical multiple access wireless communication systems is discussed. The proto...
We propose a data-driven secure wireless communication scheme, in which the goal is to transmit a si...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
A novel private communication framework is proposed where privacy is induced by transmitting over ch...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
The recent achievements in enhanced throughput, efficiency, and reliability of wireless communicatio...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
International audienceWe consider a practical scenario of the Gaussian multiantenna wiretap channel ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We propose a data-driven secure wireless communication scheme, in which the goal is to transmit a si...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
A novel private communication framework is proposed where privacy is induced by transmitting over ch...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
The recent achievements in enhanced throughput, efficiency, and reliability of wireless communicatio...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
International audienceWe consider a practical scenario of the Gaussian multiantenna wiretap channel ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We propose a data-driven secure wireless communication scheme, in which the goal is to transmit a si...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...