Results 11 to 20 of about 275,240 (330)
This paper surveys tax haven legislation and links the literature on tax havens to the literature on asymmetric information. I argue that the core aim of tax haven legislation is to create private information (secrecy) for the users of tax havens. This leads to moral hazard and transaction costs in non-havens.
openaire +4 more sources
The Crimes of the Powerful: Between Force and Consensus
Power entails the ability to act and overcome the obstacles erected by those who are subject to it. It also entails the capacity to make one’s crimes acceptable, while formulating criminal imputations against others.
Vincenzo Ruggiero
doaj +1 more source
Source-Channel Secrecy with Causal Disclosure [PDF]
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul +3 more
core +1 more source
Carceral Data: The Limits of Transparency-as-Accountability in Prison Risk Data
Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering.
Becka Hudson, Tomas Percival
doaj +1 more source
Achievable Secrecy Rates of an Energy Harvesting Device [PDF]
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro +2 more
core +2 more sources
Trade Secrets Definition in the New Iranian Act on Industrial Property: A Comparative Analysis with American Law and the TRIPS Agreement [PDF]
Trade secrets have gained unprecedented importance in all fields of industry and have emerged as a critical component of many firms' intangible assets following the big changes seen during the past decades.
Sayyed Mohammad Hadi Ghabooli Dorafshan +1 more
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj +1 more source
Mode selection, caching and physical layer security for fog networks [PDF]
Fog networks facilitate ultra-low latency through the use of data availability near the network edge in fog servers. Existing work in fog networks considers the objective of energy efficiency and low latency for internet-of-things (IoT) for resource ...
Rabeea Basir +4 more
doaj +1 more source
The Bureau and the Realism of Spy Fiction
This article addresses the issue of realism in relationship to contemporary serial fiction. Drawing on The Bureau (Canal+, 2015–2020), it argues that spy TV series are “realistic” not because they correspond to reality but because of their impact on ...
Blistène Pauline
doaj +1 more source

