Results 1 to 10 of about 48,153 (162)
Proactive Eavesdropping Performance for Integrated Satellite–Terrestrial Relay Networks
This work investigates the proactive eavesdropping based legitimate surveillance for integrated satellite-terrestrial relay networks with multiple proactive monitors.
Zheping Wu +6 more
doaj +1 more source
The Eavesdropper and Onlooker as Proximate Agents of Social Change
The eavesdropper and the onlooker have become models of activist potential. Their proximity to enactments of racist and gendered social violence, and their abilities to witness, record and disseminate records of this violence via smartphones and social ...
Carrie Rentschler
doaj +1 more source
Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission
Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On
Jie Tian +5 more
doaj +1 more source
Adaptations to sound production behaviour can reduce the detectability of animal signals by eavesdroppers in a phenomenon known as acoustic crypsis.
Julia M. Zeh +2 more
doaj +1 more source
Improving the Security of a Low-cost Tag Search Protocol [PDF]
Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among
S. Saderi Oskuiee +2 more
doaj +1 more source
A Talk on Quantum Cryptography, or How Alice Outwits Eve [PDF]
Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics.
Lomonaco Jr, Samuel J.
core +2 more sources
Secure Energy-Saving Resource Allocation on Massive MIMO-MEC System
Under the double threat of malicious user jamming attacks and eavesdropping, mobile edge computing (MEC) systems will have some information security issues, such as uplink offloading is hindered, user information leakage, and low system energy ...
Wei Zhao, Bin Wang, Hui Bao, Baogang Li
doaj +1 more source
Coherent State Quantum Key Distribution with Entanglement Witnessing [PDF]
An entanglement witness approach to quantum coherent state key distribution and a system for its practical implementation are described. In this approach, eavesdropping can be detected by a change in sign of either of two witness functions, an ...
Jaeger, Gregg +2 more
core +1 more source
Interceptive eavesdropping on the alarm calls of heterospecifics provides crucial information about predators. Previous research suggests predator discrimination, call relevance, reliability, and reception explain when eavesdropping will evolve. However,
Cameron Rouse Turner +2 more
doaj +1 more source
Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System
In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping.
Baogang Li +4 more
doaj +1 more source

