Skip to main content

Showing 1–3 of 3 results for author: Janda, C R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2001.03035  [pdf, ps, other

    cs.IT

    Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer

    Authors: Carsten Rudolf Janda, Moritz Wiese, Eduard A. Jorswieck, Holger Boche

    Abstract: Secure communication in a potentially malicious environment becomes more and more important. The arbitrarily varying wiretap channel (AVWC) provides information theoretical bounds on how much information can be exchanged even in the presence of an active attacker. If the active attacker has non-causal side information, situations in which a legitimate communication system has been hacked, can be m… ▽ More

    Submitted 14 April, 2022; v1 submitted 9 January, 2020; originally announced January 2020.

  2. arXiv:1712.03692  [pdf, other

    cs.IT

    On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT

    Authors: Pin-Hsun Lin, Eduard A. Jorswieck, Rafael F. Schaefer, Martin Mittelbach, Carsten R. Janda

    Abstract: In this paper, fading Gaussian multiuser channels are considered. If the channel is perfectly known to the transmitter, capacity has been established for many cases in which the channels may satisfy certain information theoretic orders such as degradedness or strong/very strong interference. Here, we study the case when only the statistics of the channels are known at the transmitter which is an o… ▽ More

    Submitted 3 October, 2018; v1 submitted 11 December, 2017; originally announced December 2017.

    Comments: 40 pages, 4 figures, submitted to IEEE Trans. Info. Theory

  3. arXiv:1702.03778  [pdf, other

    cs.IT

    Stealthy Secret Key Generation

    Authors: Pin-Hsun Lin, Carsten Rudolf Janda, Eduard Axel Jorswieck

    Abstract: In this work, we consider a complete covert communication system, which includes the source-model of a stealthy secret key generation (SSKG) as the first phase. The generated key will be used for the covert communication in the second phase of the current round and also in the first phase of the next round. We investigate the stealthy SK rate performance of the first phase. The derived results sho… ▽ More

    Submitted 28 February, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: 22 pages, 1 figure, submitted to ISIT 2017. Typos in (8) are fixed in the second version