Results 91 to 100 of about 48,172 (181)

Simulation analysis of security performance of DPSKOCDMA network via virtual user scheme [PDF]

open access: yesMaejo International Journal of Science and Technology, 2012
A novel technique to enhance the security of an optical code division multipleaccess (OCDMA) system against eavesdropping is proposed. It has been observed that whena single user is active in the network, an eavesdropper can easily sift the data ...
Vishav Jyoti
doaj  

Reading Lips: An Analytical Framework for Adversarial Passive Detection of Wireless Traffic in IoT Ecosystems

open access: yesIEEE Access
Eavesdropping by passive adversaries in wireless communications represents a significant threat, particularly within Internet of Things (IoT) environments, due to the limited security capabilities of such devices and the broadcast nature of wireless ...
Abdallah Farraj, Eman Hammad
doaj   +1 more source

Covert Information Mapped Generalized Spatial and Direction Modulation toward Secure Wireless Transmission

open access: yesSensors
In this paper, for the sake of enhancing the security of wireless transmission, we proposed a novel system based on spatial and direction modulation (SDM) combined with generalized spatial modulation (GSM) which is aided by covert information mapping ...
Yuan Zhong   +6 more
doaj   +1 more source

Nadzorować i słuchać

open access: yesTeksty Drugie
This text is an excerpt from the book Sur écoute : esthétique de l’espionnage (All Ears: The Aesthetics of Espionage) first published by Éditions de Minuit in 2007.
Peter Szendy
doaj  

Randomness certification in a quantum network with independent sources. [PDF]

open access: yesSci Adv
Minati G   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy