Results 1 to 10 of about 306,585 (324)

Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems

open access: yesIEEE Transactions on Vehicular Technology, 2020
In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user.
Liang Yang   +5 more
semanticscholar   +3 more sources

On Secrecy Performance of RIS-Assisted MISO Systems Over Rician Channels With Spatially Random Eavesdroppers [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2023
Reconfigurable intelligent surface (RIS) technology is emerging as a promising technique for performance enhancement for next-generation wireless networks.
Wei Shi   +5 more
semanticscholar   +1 more source

On the Secrecy Design of STAR-RIS Assisted Uplink NOMA Networks [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2021
This paper investigates the secure transmission in a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal multiple access system, where the legitimate users send confidential signals to ...
Zheng Zhang   +5 more
semanticscholar   +1 more source

A Lightweight Multi-View Learning Approach for Phishing Attack Detection Using Transformer with Mixture of Experts

open access: yesApplied Sciences, 2023
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang   +4 more
doaj   +1 more source

Minimization of Secrecy Outage Probability in Reconfigurable Intelligent Surface-Assisted MIMOME System [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2022
This article investigates physical layer security (PLS) in reconfigurable intelligent surface (RIS)-assisted multiple-input multiple-output multiple-antenna-eavesdropper (MIMOME) channels.
Yiliang Liu   +3 more
semanticscholar   +1 more source

(Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices

open access: yesSecrecy and Society, 2023
This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose
L. Muller, Natalie Welfens
semanticscholar   +1 more source

Secrecy, Suspicion, Exposure: Negotiating Authority Structures in a Settler Colonial Society as Depicted in Walter Van Tilburg Clark’s The Ox-Bow Incident

open access: yesEuropean Journal of American Studies, 2021
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj   +1 more source

On secrecy above secrecy capacity [PDF]

open access: yes2012 IEEE International Conference on Communication Systems (ICCS), 2012
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R.   +2 more
openaire   +2 more sources

The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance

open access: yesConstitutionale, 2023
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj   +1 more source

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

open access: yesSensors, 2021
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy