Results 261 to 270 of about 95,937 (277)
Some of the next articles are maybe not open access.
Wireless Physical-Layer Security: Lessons Learned From Information Theory
Proceedings of the IEEE, 2015Aylin Yener, Sennur Ulukus
exaly
A game-theoretic analysis of information sharing and security investment for complementary firms
Journal of the Operational Research Society, 2014Shue Mei
exaly
A game-theoretic analysis of information security investment for multiple firms in a network
Journal of the Operational Research Society, 2017Xiaofei Qian, Jun Pei
exaly
An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes
IEEE Transactions on Information Forensics and Security, 2014Frederique Oggier
exaly
Information Technology and Cancer Prevention
Ca-A Cancer Journal for Clinicians, 2006Masahito Jimbo +2 more
exaly
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
IEEE Transactions on Information Forensics and Security, 2016Xiaofu Wu, Zhen Yang, Cong Ling
exaly
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory, 2008Ueli Maurer, Yuliang Zheng
exaly

