<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
The paper studies the wiretap erasure broadcast channel (BC) with an external eavesdropper when the legitimate receivers have cache memories. Various secure coding schemes are proposed for a scenario where K w weak receivers have same erasure probabilities and K s strong receivers have same erasure probabilities. The coding schemes achieve the cache-aided secrecy capacity when only weak receivers have cache memories and this cache memory is either small or large. They also allow to conclude the following: 1) Under a total cache budget it is often beneficial to assign the cache memories unequally between strong and weak receivers. 2.) Joint cache-channel coding is necessary to attain the optimal performance. 3.) The secrecy capacity can be positive even when the eavesdropper is stronger than the legitimate receivers.
[INFO] Computer Science [cs]
[INFO] Computer Science [cs]
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 5 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |