Results 61 to 70 of about 48,172 (181)

Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks

open access: yesIEEE Access, 2020
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated ...
Rui Ma   +4 more
doaj   +1 more source

Which verification qubits perform best for secure communication in noisy channel?

open access: yes, 2015
In secure quantum communication protocols, a set of single qubits prepared using 2 or more mutually unbiased bases or a set of $n$-qubit ($n\geq2$) entangled states of a particular form are usually used to form a verification string which is subsequently
De, Asok   +4 more
core   +1 more source

‘Talk to Us, Not About Us’: Children's Understandings and Experiences of Participation in Australian Family Law

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT A hive of recent policy and legislative activity in Australian family law has emphasized the importance of children's right to participate in decision‐making following parental separation. Yet a powerful tension persists between supporting children's right to participation and protecting children from parental conflict.
Georgina Dimopoulos   +3 more
wiley   +1 more source

The origin of social evaluation, social eavesdropping, reputation formation, image scoring or what you will

open access: yesFrontiers in Psychology, 2016
Social evaluation is a mental process that leverages the preference toward prosocial partners (positivity bias) against the avoidance of antisocial individuals (negativity bias) in a cooperative context.
Judit Abdai   +2 more
doaj   +1 more source

Nathusius’ bats, Pipistrellus nathusii, bypass mating opportunities of their own species, but respond to foraging heterospecifics on migratory transit flights

open access: yesFrontiers in Ecology and Evolution, 2023
In late summer, migratory bats of the temperate zone face the challenge of accomplishing two energy-demanding tasks almost at the same time: migration and mating.
Lara C. Marggraf   +9 more
doaj   +1 more source

Comment on "Quantum dense key distribution"

open access: yes, 2004
In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev.
Antoni Wójcik, C. H. Bennett
core   +1 more source

Eavesdropping on Memory

open access: yesAnnual Review of Psychology, 2017
For more than four decades, I have been studying human memory. My research concerns the malleable nature of memory. Information suggested to an individual about an event can be integrated with the memory of the event itself, so that what actually occurred, and what was discussed later about what may have occurred, become inextricably interwoven ...
openaire   +4 more sources

Multiparasitism Resolves the Apparent Paradox of High Male Pheromone Investment Despite Frequent Within‐Host Mating in a Parasitoid

open access: yesEntomologia Experimentalis et Applicata, EarlyView.
It is unknown why males of the parasitoid wasp Nasonia giraulti produce large amounts of a costly sex pheromone although they were long thought to mate with their females already before emergence within the host. Mated females do no longer respond to the pheromone.
Martina Wendler   +2 more
wiley   +1 more source

OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services

open access: yesIEEE Access, 2017
An efficient physical layer security technique, referred to as OFDM with subcarrier index selection (OFDM-SIS), is proposed for safeguarding the transmission of OFDM-based waveforms against eavesdropping in 5G and beyond wireless networks.
Jehad M. Hamamreh   +2 more
doaj   +1 more source

Intelligent OFDM telecommunication system. Part 4. Anti-eavesdropping and anti-jamming properties of the system, based on many-parameter and fractional Fourier transforms [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter wavelet and Golay transforms (MPWT and MPGT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy