通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 26

Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach
Ning, Zhaolong; Sun, Shouming; Wang, Xiaojie; Guo, Lei; Wang, Guoyin; Gao, Xinbo; Kwok, Ricky Y. K.
Sci China Inf Sci, 2021, 64(6): 162303
Keywords: mobile blockchain; deep reinforcement learning; mobile edge computing; power allocation; bandwidth allocation
Cite as: Ning Z L, Sun S M, Wang X J, et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci China Inf Sci, 2021, 64(6): 162303, doi: 10.1007/s11432-020-3125-y

Highly Cited Paper 通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 21

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
Wang, Chenyu; Wang, Ding; Xu, Guoai; He, Debiao
Sci China Inf Sci, 2022, 65(1): 112301
Keywords: industry 4.0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack
Cite as: Wang C Y, Wang D, Xu G A, et al. Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci China Inf Sci, 2022, 65(1): 112301, doi: 10.1007/s11432-020-2975-6

通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 18

Physical layer security for massive access in cellular Internet of Things
Qi, Qiao; Chen, Xiaoming; Zhong, Caijun; Zhang, Zhaoyang
Sci China Inf Sci, 2020, 63(2): 121301
Keywords: 5g and beyond; phy-security; massive access; cellular iot
Cite as: Qi Q, Chen X M, Zhong C J, et al. Physical layer security for massive access in cellular Internet of Things. Sci China Inf Sci, 2020, 63(2): 121301, doi: 10.1007/s11432-019-2650-4

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 17

Secure network coding from secure proof of retrievability
Chang, Jinyong; Shao, Bilin; Ji, Yanyan; Xu, Maozhi; Xue, Rui
Sci China Inf Sci, 2021, 64(12): 229301
Keywords: network coding; proof of retrievability; random oracle; provable security; cloud storage
Cite as: Chang J Y, Shao B L, Ji Y Y, et al. Secure network coding from secure proof of retrievability. Sci China Inf Sci, 2021, 64(12): 229301, doi: 10.1007/s11432-020-2997-0

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 11

Generative adversarial networks enhanced location privacy in 5G networks
Qu, Youyang; Zhang, Jingwen; Li, Ruidong; Zhang, Xiaoning; Zhai, Xuemeng; Yu, Shui
Sci China Inf Sci, 2020, 63(12): 220303
Keywords: 5g; privacy preservation; generative adversarial nets; differential privacy
Cite as: Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63(12): 220303, doi: 10.1007/s11432-019-2834-x

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 8

An overview of cryptographic primitives for possible use in 5G and beyond
Yang, Jing; Johansson, Thomas
Sci China Inf Sci, 2020, 63(12): 220301
Keywords: 5g; cryptographic primitives; lightweight cryptography; post-quantum cryptography
Cite as: Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63(12): 220301, doi: 10.1007/s11432-019-2907-4

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 6

Security in edge-assisted Internet of Things: challenges and solutions
Shen, Shuaiqi; Zhang, Kuan; Zhou, Yi; Ci, Song
Sci China Inf Sci, 2020, 63(12): 220302
Keywords: internet of things; edge computing; network security; machine learning; data analytics
Cite as: Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63(12): 220302, doi: 10.1007/s11432-019-2906-y

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 4

Secure routing and transmission scheme for space-ocean broadband wireless network
Fu, Yuzhou; Jiang, Chuan-Ao; Qin, Yurong; Yin, Liuguo
Sci China Inf Sci, 2020, 63(4): 149303
Keywords: security; routing; transmission scheme; space-ocean network; relay; network efficiency
Cite as: Fu Y Z, Jiang C-A, Qin Y R, et al. Secure routing and transmission scheme for space-ocean broadband wireless network. Sci China Inf Sci, 2020, 63(4): 149303, doi: 10.1007/s11432-018-9876-6

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 3

Revocable and certificateless public auditing for cloud storage
Zhang, Yinghui; Zhang, Tiantian; Xu, Shengmin; Xu, Guowen; Zheng, Dong
Sci China Inf Sci, 2020, 63(10): 209302
Keywords: certificateless signature; public auditing; tag update; cloud storage; key update
Cite as: Zhang Y H, Zhang T T, Xu S M, et al. Revocable and certificateless public auditing for cloud storage. Sci China Inf Sci, 2020, 63(10): 209302, doi: 10.1007/s11432-019-2793-y

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 3

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET
Soleymani, S. A.; Anisi, M. H.; Abdullah, A. Hanan; Ngadi, M. Asri; Goudarzi, Sh; Khan, M. Khurram; Kama, M. Nazri
Sci China Inf Sci, 2020, 63(12): 220305
Keywords: authentication; plausibility; fuzzy logic; cuckoo filter; 5g-vanet; big data
Cite as: Soleymani S A, Anisi M H, Abdullah A H, et al. An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci China Inf Sci, 2020, 63(12): 220305, doi: 10.1007/s11432-019-2835-4

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 3

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Li, Zengpeng; Sharma, Vishal; Ma, Chunguang; Ge, Chunpeng; Susilo, Willy
Sci China Inf Sci, 2021, 64(6): 169301
Keywords: cloud computing; access control; constrained prf; ciphertext-policy attribute-based proxy re-encryption; proxy re-encryption; attribute-based proxy re-encryption
Cite as: Li Z P, Sharma V, Ma C G, et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci China Inf Sci, 2021, 64(6): 169301, doi: 10.1007/s11432-019-2856-8

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 2

Secure analysis over generalized-K channels
Zhang, Luyao; Zhao, Hui; Pan, Gaofeng; Yang, Liang; Chen, Jiawei
Sci China Inf Sci, 2020, 63(4): 149304
Keywords: physical layer security; secrecy outage probability; generalized-k channels; performance anlsysis; asymptotic analysis
Cite as: Zhang L Y, Zhao H, Pan G F, et al. Secure analysis over generalized-K channels. Sci China Inf Sci, 2020, 63(4): 149304, doi: 10.1007/s11432-019-9892-y

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Proactive eavesdropping of wireless powered suspicious interference networks
Xu, Ding; Zhu, Hongbo
Sci China Inf Sci, 2021, 64(12): 229305
Keywords: legitimate surveillance; proactive eavesdropping; wireless powered suspicious interference networks; successive interference cancellation; physical layer security
Cite as: Xu D, Zhu H B. Proactive eavesdropping of wireless powered suspicious interference networks. Sci China Inf Sci, 2021, 64(12): 229305, doi: 10.1007/s11432-020-2992-3

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system
Wu, Yue; Yin, Shishu; Zhou, Jian; Yang, Pei; Yang, Hongwen
Sci China Inf Sci, 2020, 63(2): 122303
Keywords: physical layer security (pls); hybrid automatic repeat request (harq); chase combining (cc); effective secrecy throughput (est); quasi-concave optimization
Cite as: Wu Y, Yin S S, Zhou J, et al. Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system. Sci China Inf Sci, 2020, 63(2): 122303, doi: 10.1007/s11432-019-2660-3

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Secure transmission for heterogeneous cellular network with limited feedback
Jiang, Wenyu; Huang, Kaizhi; Xiao, Shuaifang; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220304
Keywords: physical layer security; heterogeneous cellular networks; limited feedback; secure transmission; average secrecy throughput
Cite as: Jiang W Y, Huang K Z, Xiao S F, et al. Secure transmission for heterogeneous cellular network with limited feedback. Sci China Inf Sci, 2020, 63(12): 220304, doi: 10.1007/s11432-019-2836-0

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

On efficient key tag writing in RFID-enabled IoT
Zhang, Pengfei; Liu, Hao; Yu, Jihong
Sci China Inf Sci, 2021, 64(6): 169305
Keywords: rfid; key tag writiing; time efficiency; iot; multiple groups
Cite as: Zhang P F, Liu H, Yu J H. On efficient key tag writing in RFID-enabled IoT. Sci China Inf Sci, 2021, 64(6): 169305, doi: 10.1007/s11432-019-2891-3

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Differential game-based analysis of multi-attacker multi-defender interaction
Gao, Qiuyue; Wu, Huici; Zhang, Yunfei; Tao, Xiaofeng
Sci China Inf Sci, 2021, 64(12): 222302
Keywords: differential game; multi-attacker to multi-defender interaction; optimal control theory; hamilton function; equilibrium strategy
Cite as: Gao Q Y, Wu H C, Zhang Y F, et al. Differential game-based analysis of multi-attacker multi-defender interaction. Sci China Inf Sci, 2021, 64(12): 222302, doi: 10.1007/s11432-020-3228-8

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker
Teng, Yin; Li, Jiayu; Huang, Mengxing; Liu, Lin; Xia, Guiyang; Zhou, Xiaobo; Shu, Feng; Wang, Jiangzhou
Sci China Inf Sci, 2022, 65(1): 119302
Keywords: malicious attacker; secure; directional modulation; secrecy rate; receive beamforming; null-space projection
Cite as: Teng Y, Li J Y, Huang M X, et al. Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker. Sci China Inf Sci, 2022, 65(1): 119302, doi: 10.1007/s11432-020-3232-4

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Multi-variant network address hopping to defend stealthy crossfire attack
Zhou, Boyang; Pan, Gaoning; Wu, Chunming; Zhu, Kai; Ruan, Wei
Sci China Inf Sci, 2020, 63(6): 169301
Keywords: multi-variant network address hopping; crossfire attack; cyber mimic defense; openflow; software-defined networking; distributed denial-of-service attack
Cite as: Zhou B Y, Pan G N, Wu C M, et al. Multi-variant network address hopping to defend stealthy crossfire attack. Sci China Inf Sci, 2020, 63(6): 169301, doi: 10.1007/s11432-019-9921-7

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks
Huang, Kaizhi; Zhang, Bo; Zhong, Zhou; Chen, Yajun; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220306
Keywords: physical layer security; simultaneous wireless information and power transfer; heterogeneous networks; robust beamforming; convex optimization
Cite as: Huang K Z, Zhang B, Zhong Z, et al. Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks. Sci China Inf Sci, 2020, 63(12): 220306, doi: 10.1007/s11432-019-2923-0

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

An area based physical layer authentication framework to detect spoofing attacks
Li, Na; Xia, Shida; Tao, Xiaofeng; Zhang, Zhiyuan; Wang, Xiaohui
Sci China Inf Sci, 2020, 63(12): 222302
Keywords: physical layer authentication; light weight authentication; security situation distribution; spoofing; area authentication
Cite as: Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63(12): 222302, doi: 10.1007/s11432-019-2802-x

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Robustness of interdependent multi-model addressing networks
Han, Weitao; Tian, Le; Zhang, Fengyu; Yi, Peng
Sci China Inf Sci, 2021, 64(6): 169304
Keywords: multi-model addressing; interdependent networks; robustness; percolation; cascade of failures
Cite as: Han W T, Tian L, Zhang F Y, et al. Robustness of interdependent multi-model addressing networks. Sci China Inf Sci, 2021, 64(6): 169304, doi: 10.1007/s11432-019-2892-0

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things
Xie, Renchao; Wang, Zhiyuan; Yu, Fei Richard; Huang, Tao; Liu, Yunjie
Sci China Inf Sci, 2021, 64(8): 182301
Keywords: industrial internet of things; identity resolution; distributed hash table; small world model
Cite as: Xie R C, Wang Z Y, Yu F R, et al. A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things. Sci China Inf Sci, 2021, 64(8): 182301, doi: 10.1007/s11432-020-3016-x

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Covert communication with beamforming over MISO channels in the finite blocklength regime
Yu, Xinchun; Luo, Yuan; Chen, Wen
Sci China Inf Sci, 2021, 64(9): 192303
Keywords: beamforming; circular symmetric complex gaussian; covert communication; miso channels; power control
Cite as: Yu X C, Luo Y, Chen W. Covert communication with beamforming over MISO channels in the finite blocklength regime. Sci China Inf Sci, 2021, 64(9): 192303, doi: 10.1007/s11432-019-2919-5

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Keywords: wireless powered communication network; secure communication; eavesdropping; energy accumulation; energy harvesting
Cite as: Xu D. Secure communication in wireless powered communication networks with energy accumulation. Sci China Inf Sci, 2021, 64(10): 209301, doi: 10.1007/s11432-019-2840-2

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Secure polar coding for a joint source-channel model
Wang, Haowei; Tao, Xiaofeng; Wu, Huici; Li, Na; Xu, Jin
Sci China Inf Sci, 2021, 64(11): 212301
Keywords: polar codes; joint source-channel model; correlated sources; secret-key generation; wiretap channel
Cite as: Wang H W, Tao X F, Wu H C, et al. Secure polar coding for a joint source-channel model. Sci China Inf Sci, 2021, 64(11): 212301, doi: 10.1007/s11432-020-3119-3

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

A comprehensive evaluation of diversity systems based on mimic defense
Tong, Qing; Guo, Yunfei
Sci China Inf Sci, 2021, 64(12): 229304
Keywords: cyberspace security; software diversity; mimic defense; web server system; quantitative evaluation
Cite as: Tong Q, Guo Y F. A comprehensive evaluation of diversity systems based on mimic defense. Sci China Inf Sci, 2021, 64(12): 229304, doi: 10.1007/s11432-020-3008-1

通信 网络安全 PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 0

Development paradigms of cyberspace endogenous safety and security
Wu, Jiangxing
Sci China Inf Sci, 2022, 65(5): 156301
Keywords: reconfigurable architectures; energy efficiency; cryptographic accelerator; flexibility; side channel analysis
Cite as: Wu J X. Development paradigms of cyberspace endogenous safety and security. Sci China Inf Sci, 2022, 65(5): 156301, doi: 10.1007/s11432-021-3379-2

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Intelligent networking in adversarial environment: challenges and opportunities
Zhao, Yi; Xu, Ke; Li, Qi; Wang, Haiyang; Wang, Dan; Zhu, Min
Sci China Inf Sci, 2022, 65(7): 170301
Keywords: intelligent networking; adversarial; attacks; defense; security
Cite as: Zhao Y, Xu K, Li Q, et al. Intelligent networking in adversarial environment: challenges and opportunities. Sci China Inf Sci, 2022, 65(7): 170301, doi: 10.1007/s11432-021-3463-9

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing
Peng, Bo; Chi, Mingmin; Liu, Chao
Sci China Inf Sci, 2022, 65(7): 170302
Keywords: federated learning; secure computing; industrial Internet of Things (IIoT); machine vision; texture encoding; image classification; Non-IID
Cite as: Peng B, Chi M M, Liu C. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing. Sci China Inf Sci, 2022, 65(7): 170302, doi: 10.1007/s11432-021-3423-9

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
Liu, Guangrui; Zhang, Weizhe; Li, Xinjie; Fan, Kaisheng; Yu, Shui
Sci China Inf Sci, 2022, 65(7): 170303
Keywords: AI security; adversarial sample; data poisoning; network intrusion detection; generative adversarial network
Cite as: Liu G R, Zhang W Z, Li X J, et al. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems. Sci China Inf Sci, 2022, 65(7): 170303, doi: 10.1007/s11432-021-3455-1

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
Wu, Weiwei; Hu, Su; Lin, Di; Wu, Gang
Sci China Inf Sci, 2022, 65(7): 170304
Keywords: user authentication; Internet of things; convolutional neural network; RF fingerprinting; NP-hard optimization problem
Cite as: Wu W W, Hu S, Lin D, et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci China Inf Sci, 2022, 65(7): 170304, doi: 10.1007/s11432-021-3284-y

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
Li, Huanruo; Guo, Yunfei; Huo, Shumin; Hu, Hongchao; Sun, Penghao
Sci China Inf Sci, 2022, 65(7): 170305
Keywords: cyber deception defense; artificial intelligence; cloud security; reconnaissance attack; deep reinforcement learning; deception strategy
Cite as: Li H R, Guo Y F, Huo S M, et al. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Sci China Inf Sci, 2022, 65(7): 170305, doi: 10.1007/s11432-021-3462-4

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Certified defense against patch attacks via mask-guided randomized smoothing
Zhang, Kui; Zhou, Hang; Bian, Huanyu; Zhang, Weiming; Yu, Nenghai
Sci China Inf Sci, 2022, 65(7): 170306
Keywords: certified defense; adversarial patch; patch localization; randomized smoothing; joint voting
Cite as: Zhang K, Zhou H, Bian H Y, et al. Certified defense against patch attacks via mask-guided randomized smoothing. Sci China Inf Sci, 2022, 65(7): 170306, doi: 10.1007/s11432-021-3457-7

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
Zhao, Jiaqi; Zhu, Hui; Wang, Fengwei; Lu, Rongxing; Li, Hui; Zhou, Zhongmin; Wan, Haitao
Sci China Inf Sci, 2022, 65(7): 170307
Keywords: vertically federated learning; privacy-preserving; logistic regression; symmetric homomorphic encryption; efficiency
Cite as: Zhao J Q, Zhu H, Wang F W, et al. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data. Sci China Inf Sci, 2022, 65(7): 170307, doi: 10.1007/s11432-021-3415-1

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Post quantum secure fair data trading with deterability based on machine learning
Liu, Jinhui; Yu, Yong; Bi, Hongliang; Zhao, Yanqi; Wang, Shijia; Zhang, Huanguo
Sci China Inf Sci, 2022, 65(7): 170308
Keywords: designated verifier signatures; zk-SNARKs; double authentication preventing signatures; lattice; machine learning
Cite as: Liu J H, Yu Y, Bi H L, et al. Post quantum secure fair data trading with deterability based on machine learning. Sci China Inf Sci, 2022, 65(7): 170308, doi: 10.1007/s11432-021-3441-y

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Secure coordinated direct and untrusted relay transmissions via interference engineering
Lv, Lu; Li, Zan; Ding, Haiyang; Zhou, Yuchen; Chen, Jian
Sci China Inf Sci, 2022, 65(8): 182304
Keywords: physical layer security; untrusted relay; interference exploitation; coordinated transmission; ergodic secrecy rate
Cite as: Lv L, Li Z, Ding H Y, et al. Secure coordinated direct and untrusted relay transmissions via interference engineering. Sci China Inf Sci, 2022, 65(8): 182304, doi: 10.1007/s11432-021-3259-0

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
Gong, Shixun; Tao, Xiaofeng; Li, Na; Wang, Haowei; Xu, Jin
Sci China Inf Sci, 2022, 65(9): 192304
Keywords: physical layer security; physical layer secret key generation; Nakagami-m fading; correlated eavesdropping channel; secret key capacity
Cite as: Gong S X, Tao X F, Li N, et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci China Inf Sci, 2022, 65(9): 192304, doi: 10.1007/s11432-021-3353-5