The Bermuda Triangle: The Pragmatics, Policies, and Principles for Data Sharing in the History of the Human Genome Project. [PDF]
© The Author(s), 2018. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Journal of the History of Biology 51 (2018): 693–805, doi:10.1007/s10739-018-9538-7.The Bermuda ...
Maxson Jones K +2 more
europepmc +3 more sources
HORNET: High-speed Onion Routing at the Network Layer [PDF]
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico +4 more
core +2 more sources
Enhancing Physical Layer Secrecy Performance for RIS-assisted RF-FSO Mixed Wireless System [PDF]
Peer reviewedPublisher ...
Abdullah-Al-Wadud, M. +6 more
core +1 more source
ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang +4 more
doaj +1 more source
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang +4 more
doaj +1 more source
SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang +4 more
doaj +1 more source
Cooperative Secure Transmission in the Presence of Untrusted Relay
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +1 more source
A novel approach to MISO interference networks under maximum receive-power regulation [PDF]
An aggressive frequency reuse is expected within the next years in order to increase the spectral ef¿ciency. Multiuser interference by all in-band transmitters can create a communication bottleneck and, therefore, it is compulsory to control it by means ...
Lagunas Hernandez, Miguel A. +2 more
core +2 more sources
Multiuser-scheduling and resource allocation using max-min technique in wireless powered communication networks [PDF]
Wireless powered communication network (WPCN) is a promising research area for improving network security and speed. The transmission power of the source during the uplink functions as a random variable in WPCN due to the intrinsic power transfer process,
Mary Thomas, Richu +1 more
core +4 more sources
Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers
The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an ...
Gerardo Gomez +4 more
doaj +1 more source

