Results 1 to 10 of about 306,585 (324)
Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems
In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user.
Liang Yang +5 more
semanticscholar +3 more sources
On Secrecy Performance of RIS-Assisted MISO Systems Over Rician Channels With Spatially Random Eavesdroppers [PDF]
Reconfigurable intelligent surface (RIS) technology is emerging as a promising technique for performance enhancement for next-generation wireless networks.
Wei Shi +5 more
semanticscholar +1 more source
On the Secrecy Design of STAR-RIS Assisted Uplink NOMA Networks [PDF]
This paper investigates the secure transmission in a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal multiple access system, where the legitimate users send confidential signals to ...
Zheng Zhang +5 more
semanticscholar +1 more source
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang +4 more
doaj +1 more source
Minimization of Secrecy Outage Probability in Reconfigurable Intelligent Surface-Assisted MIMOME System [PDF]
This article investigates physical layer security (PLS) in reconfigurable intelligent surface (RIS)-assisted multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) channels.
Yiliang Liu +3 more
semanticscholar +1 more source
(Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices
This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose
L. Muller, Natalie Welfens
semanticscholar +1 more source
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R. +2 more
openaire +2 more sources
The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj +1 more source
Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous +5 more
doaj +1 more source

