Results 1 to 10 of about 265,702 (184)
Phishing poses a significant threat to the financial and privacy security of internet users and often serves as the starting point for cyberattacks.
Yanbin Wang +4 more
doaj +1 more source
On secrecy above secrecy capacity [PDF]
5 Pages, 2 Figures, Submitted to ICCS ...
Ramachandran Rajesh +2 more
openaire +2 more sources
The article discusses the ways in which Walter Van Tilburg Clark’s 1940 novel The Ox-Bow Incident problematizes the issues of secrecy, suspicion, gossip and exposure as a basis for the depiction of a variety of regulatory practices in a hierarchized ...
Marek Paryż
doaj +1 more source
The Right of Access to Public Information: Human Rights Issues, Transparency and Good Governance
The right of access to information is based on both Article 19 of the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR), which guarantee everyone the right and freedom “to seek, receive and ...
Didier Yangonzela Liambomba
doaj +1 more source
Optimized Artificial Bee Colony Algorithm with Markov Chain
The shortcomings of the artificial bee colony algorithm (ABC) and its improved algorithm are analyzed. This paper proposes the improved Markov ABC (IMABC) dividing the ABC algorithm into two stages by verifying the Markov property of the artificial bee ...
GUO Jia, MA Chaobin, ZHANG Shaobo, MIAO Mengmeng
doaj +1 more source
Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper.
Mujtaba Ghous +5 more
doaj +1 more source
Broken Latin, Secret Europe: Benjamin, Celan, Derrida
The author begins by analyzing Walter Benjamin’s quarrel with George Kreis and the respective visions of culture advocated by both sides of the debate.
Adam Lipszyc
doaj +1 more source
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source
Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm
At present, the election based distributed consistency algorithm (Paxos like algorithm) applied in distri-buted system is elected by more than 50% of the voters.
LI Bin, JIANG Jianguo
doaj +1 more source
“Without freedom of speech there is no modern world, just a barbaric one.” These words from China's most famous artist and activist, Ai Weiwei, have never been more important. Ai Weiwei would probably agree that China's actions in the coronavirus crisis require the voice of the scientific community, and he wouldn't be surprised that getting folks to ...
openaire +2 more sources

