Results 1 to 10 of about 275,240 (330)
Secrecy, Betrayal and Crime [PDF]
In the past few years numerous secret transgressions and crimes have been revealed in the media. Whistleblowers reveal clandestine agreements between managers and directors of large companies; criminals (pentiti) make deals with criminal justice ...
Dina Siegel
doaj +2 more sources
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang +4 more
doaj +1 more source
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Rajesh, R. +2 more
openaire +2 more sources
The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj +1 more source
Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous +5 more
doaj +1 more source
Optimized Artificial Bee Colony Algorithm with Markov Chain
The shortcomings of the artificial bee colony algorithm (ABC) and its improved algorithm are analyzed. This paper proposes the improved Markov ABC (IMABC) dividing the ABC algorithm into two stages by verifying the Markov property of the artificial bee ...
GUO Jia, MA Chaobin, ZHANG Shaobo, MIAO Mengmeng
doaj +1 more source
Broken Latin, Secret Europe: Benjamin, Celan, Derrida
The author begins by analyzing Walter Benjamin’s quarrel with George Kreis and the respective visions of culture advocated by both sides of the debate.
Adam Lipszyc
doaj +1 more source
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source
On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi +2 more
core +3 more sources

