Results 61 to 70 of about 48,172 (181)
Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated ...
Rui Ma +4 more
doaj +1 more source
Which verification qubits perform best for secure communication in noisy channel?
In secure quantum communication protocols, a set of single qubits prepared using 2 or more mutually unbiased bases or a set of $n$-qubit ($n\geq2$) entangled states of a particular form are usually used to form a verification string which is subsequently
De, Asok +4 more
core +1 more source
ABSTRACT A hive of recent policy and legislative activity in Australian family law has emphasized the importance of children's right to participate in decision‐making following parental separation. Yet a powerful tension persists between supporting children's right to participation and protecting children from parental conflict.
Georgina Dimopoulos +3 more
wiley +1 more source
Social evaluation is a mental process that leverages the preference toward prosocial partners (positivity bias) against the avoidance of antisocial individuals (negativity bias) in a cooperative context.
Judit Abdai +2 more
doaj +1 more source
In late summer, migratory bats of the temperate zone face the challenge of accomplishing two energy-demanding tasks almost at the same time: migration and mating.
Lara C. Marggraf +9 more
doaj +1 more source
Comment on "Quantum dense key distribution"
In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev.
Antoni Wójcik, C. H. Bennett
core +1 more source
For more than four decades, I have been studying human memory. My research concerns the malleable nature of memory. Information suggested to an individual about an event can be integrated with the memory of the event itself, so that what actually occurred, and what was discussed later about what may have occurred, become inextricably interwoven ...
openaire +4 more sources
It is unknown why males of the parasitoid wasp Nasonia giraulti produce large amounts of a costly sex pheromone although they were long thought to mate with their females already before emergence within the host. Mated females do no longer respond to the pheromone.
Martina Wendler +2 more
wiley +1 more source
OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services
An efficient physical layer security technique, referred to as OFDM with subcarrier index selection (OFDM-SIS), is proposed for safeguarding the transmission of OFDM-based waveforms against eavesdropping in 5G and beyond wireless networks.
Jehad M. Hamamreh +2 more
doaj +1 more source
Intelligent OFDM telecommunication system. Part 4. Anti-eavesdropping and anti-jamming properties of the system, based on many-parameter and fractional Fourier transforms [PDF]
In this paper, we aim to investigate the superiority and practicability of many-parameter wavelet and Golay transforms (MPWT and MPGT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P. +4 more
core +1 more source

