81,761 research outputs found

    Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel

    Full text link
    The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symbols, and symbol-by-symbol hard-decision quantization is applied to the received symbols of the destination. An error-free public channel is also available for the source and destination to exchange messages in order to help the secret sharing process. The wiretapper can perfectly observe all messages in the public channel. It is shown that a secret sharing scheme that employs a random ensemble of regular low density parity check (LDPC) codes can achieve the key capacity of the BPSK-constrained Gaussian wiretap channel asymptotically with increasing block length. To accommodate practical constraints of finite block length and limited decoding complexity, fixed irregular LDPC codes are also designed to replace the regular LDPC code ensemble in the proposed secret sharing scheme.Comment: submitted to IEEE Trans. on Information Forensics and Security, special issues on using the physical layer for securing the next generation of communication system

    Mechanisms of sensorineural cell damage, death and survival in the cochlea.

    Get PDF
    The majority of acquired hearing loss, including presbycusis, is caused by irreversible damage to the sensorineural tissues of the cochlea. This article reviews the intracellular mechanisms that contribute to sensorineural damage in the cochlea, as well as the survival signaling pathways that can provide endogenous protection and tissue rescue. These data have primarily been generated in hearing loss not directly related to age. However, there is evidence that similar mechanisms operate in presbycusis. Moreover, accumulation of damage from other causes can contribute to age-related hearing loss (ARHL). Potential therapeutic interventions to balance opposing but interconnected cell damage and survival pathways, such as antioxidants, anti-apoptotics, and pro-inflammatory cytokine inhibitors, are also discussed

    LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel

    Full text link
    A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through the wiretap channel as well as the equivocation rate about the message at the wiretapper. A code search procedure is suggested to obtain irregular LDPC codes that achieve good secrecy performance in such context.Comment: submitted to IEEE GLOBECOM 2011 - Communication Theory Symposiu

    Nutrients in waters on the inner shelf between Cape Charles and Cape Hatteras

    Get PDF
    The distribution of nutrients in the shelf waters of the southern tip of the Middle Atlantic Bight was investigated. It is concluded that the outflow of freshwater from the Chesapeake Bay is a potential source of nutrients to the adjacent shelf waters. However, a quantitative estimation of its importance cannot yet be made because (1) there are other sources of nutrients to the study area and these sources cannot yet be quantified and (2) the concentrations of nutrients in the outflow from Chesapeake Bay exhibit significant short-term and long-term temporal variabilities

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe
    corecore