Results 71 to 80 of about 1,051 (211)

Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks

open access: yesIEEE Access, 2021
As an important partner of fifth generation (5G) communication, the internet of things (IoT) is widely used in many fields with its characteristics of massive terminals, intelligent processing, and remote control.
Hui Li   +6 more
doaj   +1 more source

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, Volume 36, Issue 15, 19 February 2026.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering

open access: yesTongxin xuebao, 2014
The existing eavesdropping method has poor anti-noise performance and high complexity, which makes it not practical. It is shown that the received scrambled signals are distributed within parallel hyperplanes if adequate antennas are equipped by ...
Lu LIU   +3 more
doaj   +2 more sources

An Anti-Jamming Hierarchical Optimization Approach in Relay Communication System via Stackelberg Game

open access: yesApplied Sciences, 2019
In this paper, we study joint relay selection and the power control optimization problem in an anti-jamming relay communication system. Considering the hierarchical competitive relationship between a user and jammer, we formulate the anti-jamming problem
Zhibin Feng   +6 more
doaj   +1 more source

Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model [PDF]

open access: yes, 2019
How to establish a secure and efficient quantum network coding algorithm is one of important research topics of quantum secure communications. Based on the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti ...
Zhexi Zhang, Zhiguo Qu
core   +2 more sources

Hamas's October 7 Attack: Analysis of an “Antagonistic” Crisis

open access: yesPublic Administration Review, Volume 86, Issue 1, Page 87-96, January/February 2026.
ABSTRACT The aim of the article is to interpret the Hamas attack of October 7, 2023 in light of crisis management theories, seeking to draw from this event some general lessons about the nature of crises, their determinants, and how they are managed. More specifically, the article addresses three questions: (1) Why did Israel underestimate the warning ...
Federico Toth
wiley   +1 more source

Anti-eavesdropping communication layer to protect against traffic analysis [PDF]

open access: yes, 2002
Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the ...
Shen, Yiping
core   +3 more sources

UAV-enabled friendly jamming scheme to secure industrial Internet of Things [PDF]

open access: yes, 2019
Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since many malicious attacks often follow eavesdropping activities.
Dai, Hong-Ning   +4 more
core   +1 more source

Zebra stripes: the questions raised by the answers

open access: yesBiological Reviews, Volume 100, Issue 6, Page 2660-2680, December 2025.
ABSTRACT Multiple hypotheses have been suggested to explain why the three zebra species (Equus quagga, E. grevyi and E. zebra) are striped. We review how well these theories explain the nature (rather than simply the existence) of the stripes. Specifically, we explore how well different theories explain (i) the form of zebra stripes (especially on ...
Hamish M. Ireland, Graeme D. Ruxton
wiley   +1 more source

Polarization bases compensation towards advantages in satellite-based QKD without active feedback

open access: yesCommunications Physics, 2023
Long-distance photonic implementations of quantum key distribution protocols have gained increased interest due to the promise of information-theoretic security against unauthorized eavesdropping.
Sourav Chatterjee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy