81,761 research outputs found
Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is
considered. A source and a destination intend to share secret information over
a Gaussian channel in the presence of a wiretapper who observes the
transmission through another Gaussian channel. Two constraints are imposed on
the source-to-destination channel; namely, the source can transmit only binary
phase shift keyed (BPSK) symbols, and symbol-by-symbol hard-decision
quantization is applied to the received symbols of the destination. An
error-free public channel is also available for the source and destination to
exchange messages in order to help the secret sharing process. The wiretapper
can perfectly observe all messages in the public channel. It is shown that a
secret sharing scheme that employs a random ensemble of regular low density
parity check (LDPC) codes can achieve the key capacity of the BPSK-constrained
Gaussian wiretap channel asymptotically with increasing block length. To
accommodate practical constraints of finite block length and limited decoding
complexity, fixed irregular LDPC codes are also designed to replace the regular
LDPC code ensemble in the proposed secret sharing scheme.Comment: submitted to IEEE Trans. on Information Forensics and Security,
special issues on using the physical layer for securing the next generation
of communication system
Recommended from our members
A Knowledge-based Decision Support System for RP&M Process Selection
Due to the large variety of RP&M material/machines and the. strengths/weaknesses
associated with different RP&M processes, the decision·to select a suitableRP&M system
becomes increasingly difficult. This paper presents a knowledge-based approach for the selection
ofsuitable RP&M material/machine to meet specific. requirements ofRP&Mapplications. The
system receives input data on the CAD modelandthe user's specifications,andgenerates outputs
that provide the most appropriate combination ofRP&Mmaterial/machine.·Optimal orientations,
together with estimated manufacturing time and cost, are considered and given in the final
outcome to help the user make the choice.Mechanical Engineerin
Mechanisms of sensorineural cell damage, death and survival in the cochlea.
The majority of acquired hearing loss, including presbycusis, is caused by irreversible damage to the sensorineural tissues of the cochlea. This article reviews the intracellular mechanisms that contribute to sensorineural damage in the cochlea, as well as the survival signaling pathways that can provide endogenous protection and tissue rescue. These data have primarily been generated in hearing loss not directly related to age. However, there is evidence that similar mechanisms operate in presbycusis. Moreover, accumulation of damage from other causes can contribute to age-related hearing loss (ARHL). Potential therapeutic interventions to balance opposing but interconnected cell damage and survival pathways, such as antioxidants, anti-apoptotics, and pro-inflammatory cytokine inhibitors, are also discussed
LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel
A coding scheme based on irregular low-density parity-check (LDPC) codes is
proposed to send secret messages from a source over the Gaussian wiretap
channel to a destination in the presence of a wiretapper, with the restriction
that the source can send only binary phase-shift keyed (BPSK) symbols. The
secrecy performance of the proposed coding scheme is measured by the secret
message rate through the wiretap channel as well as the equivocation rate about
the message at the wiretapper. A code search procedure is suggested to obtain
irregular LDPC codes that achieve good secrecy performance in such context.Comment: submitted to IEEE GLOBECOM 2011 - Communication Theory Symposiu
Nutrients in waters on the inner shelf between Cape Charles and Cape Hatteras
The distribution of nutrients in the shelf waters of the southern tip of the Middle Atlantic Bight was investigated. It is concluded that the outflow of freshwater from the Chesapeake Bay is a potential source of nutrients to the adjacent shelf waters. However, a quantitative estimation of its importance cannot yet be made because (1) there are other sources of nutrients to the study area and these sources cannot yet be quantified and (2) the concentrations of nutrients in the outflow from Chesapeake Bay exhibit significant short-term and long-term temporal variabilities
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and
other related areas, user authentication becomes more and more important to
protect the data of the users. Password authentication is one of the widely
used methods to achieve authentication for legal users and defense against
intruders. There have been many password cracking methods developed during the
past years, and people have been designing the countermeasures against password
cracking all the time. However, we find that the survey work on the password
cracking research has not been done very much. This paper is mainly to give a
brief review of the password cracking methods, import technologies of password
cracking, and the countermeasures against password cracking that are usually
designed at two stages including the password design stage (e.g. user
education, dynamic password, use of tokens, computer generations) and after the
design (e.g. reactive password checking, proactive password checking, password
encryption, access control). The main objective of this work is offering the
abecedarian IT security professionals and the common audiences with some
knowledge about the computer security and password cracking, and promoting the
development of this area.Comment: add copyright to the tables to the original authors, add
acknowledgement to helpe
- …
