Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure transmission

In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which can achieve significant… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2018
Highly Cited
2018
Security is a challenging issue for cognitive radio (CR) to be used in future 5G mobile systems. Conventionally, interference… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
This paper investigates the physical layer security of a satellite network, whose downlink spectral resource is shared with a… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table I
Is this relevant?
Highly Cited
2014
Highly Cited
2014
In this paper, we consider physical layer security provisioning in multicell massive multiple-input-multiple-output (MIMO… Expand
  • table I
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We consider the problem of secure communication with multiantenna transmission in fading channels. The transmitter simultaneously… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Achieving information theoretic security with practical coding complexity is of definite interest. This work first focuses on the… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?