Learn More
We study secure communication in which two confidential messages are transmitted over a broadcast channel to two legitimate receivers, while keeping an eavesdropper ignorant. Each legitimate receiver is interested in decoding one confidential message, while having the other one as side information. In order to measure the secrecy of the communication, we(More)
—This paper considers a three-receiver broadcast channel with degraded message sets and message cognition. The model consists of a common message for all three receivers, a private common message for only two receivers and two additional private messages for these two receivers, such that each receiver is only interested in one message, while being fully(More)
We study the transmission of a common message and three confidential messages over a broadcast channel with two legitimate receivers and an eavesdropper. Each legitimate receiver is interested in decoding two of the three confidential messages, while having the third one as side information. In order to measure the ignorance of the eavesdropper about the(More)
We study secure communication in which a transmitter wants to send confidential messages to an arbitrary number of receivers in the presence of an external eavesdropper. We consider two classes of Gaussian channels: the Gaussian single-input single-output (SISO) multi-receiver wiretap channel and the degraded Gaussian multiple-input multiple-output (MIMO)(More)
In this paper, secure communication over a broadcast channel with multiple legitimate receivers and an external eavesdropper is investigated. Two different secrecy measures are considered. The first criterion is a conservative one known as joint secrecy, where the mutual leakage of all confidential messages must be small. The second criterion is a less(More)
Carbon nanotubes (CNTs) are strong potential replacements for silicon in VLSI due to their extraordinary capabilities. We review the theory of operation of CNT-based FETs (CNFETs), the issues regarding its modern fabrication techniques, performance parameters yielded by the latest research, and finally, we present an overview of some applications employing(More)
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has(More)
  • 1