Results 71 to 80 of about 1,051 (211)
Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks
As an important partner of fifth generation (5G) communication, the internet of things (IoT) is widely used in many fields with its characteristics of massive terminals, intelligent processing, and remote control.
Hui Li +6 more
doaj +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering
The existing eavesdropping method has poor anti-noise performance and high complexity, which makes it not practical. It is shown that the received scrambled signals are distributed within parallel hyperplanes if adequate antennas are equipped by ...
Lu LIU +3 more
doaj +2 more sources
In this paper, we study joint relay selection and the power control optimization problem in an anti-jamming relay communication system. Considering the hierarchical competitive relationship between a user and jammer, we formulate the anti-jamming problem
Zhibin Feng +6 more
doaj +1 more source
Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model [PDF]
How to establish a secure and efficient quantum network coding algorithm is one of important research topics of quantum secure communications. Based on the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti ...
Zhexi Zhang, Zhiguo Qu
core +2 more sources
Hamas's October 7 Attack: Analysis of an “Antagonistic” Crisis
ABSTRACT The aim of the article is to interpret the Hamas attack of October 7, 2023 in light of crisis management theories, seeking to draw from this event some general lessons about the nature of crises, their determinants, and how they are managed. More specifically, the article addresses three questions: (1) Why did Israel underestimate the warning ...
Federico Toth
wiley +1 more source
Anti-eavesdropping communication layer to protect against traffic analysis [PDF]
Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the ...
Shen, Yiping
core +3 more sources
UAV-enabled friendly jamming scheme to secure industrial Internet of Things [PDF]
Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since many malicious attacks often follow eavesdropping activities.
Dai, Hong-Ning +4 more
core +1 more source
Zebra stripes: the questions raised by the answers
ABSTRACT Multiple hypotheses have been suggested to explain why the three zebra species (Equus quagga, E. grevyi and E. zebra) are striped. We review how well these theories explain the nature (rather than simply the existence) of the stripes. Specifically, we explore how well different theories explain (i) the form of zebra stripes (especially on ...
Hamish M. Ireland, Graeme D. Ruxton
wiley +1 more source
Polarization bases compensation towards advantages in satellite-based QKD without active feedback
Long-distance photonic implementations of quantum key distribution protocols have gained increased interest due to the promise of information-theoretic security against unauthorized eavesdropping.
Sourav Chatterjee +3 more
doaj +1 more source

