Results 21 to 30 of about 1,643 (150)

The Bermuda Triangle: The Pragmatics, Policies, and Principles for Data Sharing in the History of the Human Genome Project. [PDF]

open access: yesJ Hist Biol, 2018
© The Author(s), 2018. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Journal of the History of Biology 51 (2018): 693–805, doi:10.1007/s10739-018-9538-7.The Bermuda ...
Maxson Jones K   +2 more
europepmc   +3 more sources

Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2017
In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors ...
Marcos Eduardo Pivaro Monteiro   +3 more
semanticscholar   +1 more source

Enhancing Physical Layer Secrecy Performance for RIS-assisted RF-FSO Mixed Wireless System [PDF]

open access: yes, 2023
Peer reviewedPublisher ...
Abdullah-Al-Wadud, M.   +6 more
core   +1 more source

Multiuser-scheduling and resource allocation using max-min technique in wireless powered communication networks [PDF]

open access: yes, 2022
Wireless powered communication network (WPCN) is a promising research area for improving network security and speed. The transmission power of the source during the uplink functions as a random variable in WPCN due to the intrinsic power transfer process,
Mary Thomas, Richu   +1 more
core   +4 more sources

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

Cooperative Secure Transmission in the Presence of Untrusted Relay

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen   +4 more
doaj   +1 more source

A novel approach to MISO interference networks under maximum receive-power regulation [PDF]

open access: yes, 2018
An aggressive frequency reuse is expected within the next years in order to increase the spectral ef¿ciency. Multiuser interference by all in-band transmitters can create a communication bottleneck and, therefore, it is compulsory to control it by means ...
Lagunas Hernandez, Miguel A.   +2 more
core   +2 more sources

On effective secrecy throughput of underlay spectrum sharing α - μ/ Málaga hybrid model under interference-and-transmit power constraints [PDF]

open access: yes, 2023
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems.
Ahmed, Imtiaz   +5 more
core   +1 more source

Physical Layer Security in Cognitive Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen   +4 more
doaj   +1 more source

The Security of Practical Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
Agrawal, G. P.   +64 more
core   +2 more sources

Home - About - Disclaimer - Privacy