Results 1 to 10 of about 48,153 (162)

Proactive Eavesdropping Performance for Integrated Satellite–Terrestrial Relay Networks

open access: yesIEEE Open Journal of the Communications Society, 2023
This work investigates the proactive eavesdropping based legitimate surveillance for integrated satellite-terrestrial relay networks with multiple proactive monitors.
Zheping Wu   +6 more
doaj   +1 more source

The Eavesdropper and Onlooker as Proximate Agents of Social Change

open access: yesMedia Theory, 2022
The eavesdropper and the onlooker have become models of activist potential. Their proximity to enactments of racist and gendered social violence, and their abilities to witness, record and disseminate records of this violence via smartphones and social ...
Carrie Rentschler
doaj   +1 more source

Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission

open access: yesSensors, 2021
Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On
Jie Tian   +5 more
doaj   +1 more source

Preferred shallow-water nursery sites provide acoustic crypsis to southern right whale mother–calf pairs

open access: yesRoyal Society Open Science, 2022
Adaptations to sound production behaviour can reduce the detectability of animal signals by eavesdroppers in a phenomenon known as acoustic crypsis.
Julia M. Zeh   +2 more
doaj   +1 more source

Improving the Security of a Low-cost Tag Search Protocol [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2021
Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among
S. Saderi Oskuiee   +2 more
doaj   +1 more source

A Talk on Quantum Cryptography, or How Alice Outwits Eve [PDF]

open access: yes, 2001
Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics.
Lomonaco Jr, Samuel J.
core   +2 more sources

Secure Energy-Saving Resource Allocation on Massive MIMO-MEC System

open access: yesIEEE Access, 2020
Under the double threat of malicious user jamming attacks and eavesdropping, mobile edge computing (MEC) systems will have some information security issues, such as uplink offloading is hindered, user information leakage, and low system energy ...
Wei Zhao, Bin Wang, Hui Bao, Baogang Li
doaj   +1 more source

Coherent State Quantum Key Distribution with Entanglement Witnessing [PDF]

open access: yes, 2013
An entanglement witness approach to quantum coherent state key distribution and a system for its practical implementation are described. In this approach, eavesdropping can be detected by a change in sign of either of two witness functions, an ...
Jaeger, Gregg   +2 more
core   +1 more source

The evolution of eavesdropping on heterospecific alarm calls: Relevance, reliability, and personal information

open access: yesEcology and Evolution, 2023
Interceptive eavesdropping on the alarm calls of heterospecifics provides crucial information about predators. Previous research suggests predator discrimination, call relevance, reliability, and reception explain when eavesdropping will evolve. However,
Cameron Rouse Turner   +2 more
doaj   +1 more source

Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

open access: yesIEEE Access, 2018
In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping.
Baogang Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy