The Bermuda Triangle: The Pragmatics, Policies, and Principles for Data Sharing in the History of the Human Genome Project. [PDF]
© The Author(s), 2018. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Journal of the History of Biology 51 (2018): 693–805, doi:10.1007/s10739-018-9538-7.The Bermuda ...
Maxson Jones K +2 more
europepmc +3 more sources
Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]
In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors ...
Marcos Eduardo Pivaro Monteiro +3 more
semanticscholar +1 more source
Enhancing Physical Layer Secrecy Performance for RIS-assisted RF-FSO Mixed Wireless System [PDF]
Peer reviewedPublisher ...
Abdullah-Al-Wadud, M. +6 more
core +1 more source
Multiuser-scheduling and resource allocation using max-min technique in wireless powered communication networks [PDF]
Wireless powered communication network (WPCN) is a promising research area for improving network security and speed. The transmission power of the source during the uplink functions as a random variable in WPCN due to the intrinsic power transfer process,
Mary Thomas, Richu +1 more
core +4 more sources
HORNET: High-speed Onion Routing at the Network Layer [PDF]
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico +4 more
core +2 more sources
Cooperative Secure Transmission in the Presence of Untrusted Relay
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +1 more source
A novel approach to MISO interference networks under maximum receive-power regulation [PDF]
An aggressive frequency reuse is expected within the next years in order to increase the spectral ef¿ciency. Multiuser interference by all in-band transmitters can create a communication bottleneck and, therefore, it is compulsory to control it by means ...
Lagunas Hernandez, Miguel A. +2 more
core +2 more sources
On effective secrecy throughput of underlay spectrum sharing α - μ/ Málaga hybrid model under interference-and-transmit power constraints [PDF]
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems.
Ahmed, Imtiaz +5 more
core +1 more source
Physical Layer Security in Cognitive Untrusted Relay Networks
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen +4 more
doaj +1 more source
The Security of Practical Quantum Key Distribution [PDF]
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
Agrawal, G. P. +64 more
core +2 more sources

