Most communication systems (e.g., e-mails, instant messengers, VPNs) use encryption to prevent third parties from learning sensitive information.
However, encrypted communications protect the contents but often leak metadata: the amount of data sent and th ...
There is an increasing interest in a fast-growing machine learning technique called Federated Learning (FL), in which the model training is distributed over mobile user equipment (UEs), exploiting UEs' local computation and training data. Despite its advan ...
Automated systems based on wearable sensors for livestock monitoring are becoming increasingly popular. Specifically, wireless in-body sensors could yield relevant data, such as ruminal temperature. The collection of such data requires an accurate characte ...
Distributed ledgers provide high availability and integrity, making them a key enabler for practical and secure computation of distributed workloads among mutually distrustful parties. Many practical applications also require strong confidentiality, howeve ...
The upcoming Internet of Things (IoT) is foreseen to encompass massive numbers of connected devices, smart objects, and cyber-physical systems. Due to the large scale and massive deployment of devices, it is deemed infeasible to safeguard 100% of the devic ...
This thesis aims to explore and exploit trade-offs in integrated circuits and systems to overcome the fundamental bottlenecks faced by future data acquisition and communication systems. Specifically, we target the emerging implantable neurotechnology and t ...
Techniques are disclosed for adaptive coding and scheduling of packets in wireless networks. The adaptive coding and scheduling can be achieved by utilizing a discrete water filling (DWF) scheme. In an example, a computer-implemented method to adaptively c ...
In the Internet of Things (IoT) era, Wireless Sensor Networks (WSNs) are rapidly increasing in terms of relevance and pervasiveness thanks to their notable real-time monitoring performance across several fields, including industrial, domestic, military, bi ...
We consider the problem of secret key generation from correlated Gaussian random variables in the finite blocklength regime. Such keys could be used to encrypt communication in IoT networks, and have provable secrecy guarantees in contrast to classic crypt ...
This paper presents three different techniques for efficiently powering an energy-autonomous wireless sensor (EAWS) through both energy harvesting (EH) and RF wireless power transfer (WPT). The aim of the paper is to provide effective strategies and techni ...