Results 11 to 20 of about 265,801 (283)
Suppose that n nodes with [Formula: see text] acquaintances per node are randomly deployed in a two-dimensional Euclidean space with the geographic restriction that each pair of nodes can exchange information between them directly only if the distance between them is at most r, the acquaintanceship between nodes forms a random graph, while the ...
Zhihong Liu +4 more
openaire +2 more sources
On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi +2 more
core +3 more sources
Relating two standard notions of secrecy [PDF]
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet +11 more
core +12 more sources
The Crimes of the Powerful: Between Force and Consensus
Power entails the ability to act and overcome the obstacles erected by those who are subject to it. It also entails the capacity to make one’s crimes acceptable, while formulating criminal imputations against others.
Vincenzo Ruggiero
doaj +1 more source
This paper surveys tax haven legislation and links the literature on tax havens to the literature on asymmetric information. I argue that the core aim of tax haven legislation is to create private information (secrecy) for the users of tax havens. This leads to moral hazard and transaction costs in non-havens.
openaire +4 more sources
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source
Carceral Data: The Limits of Transparency-as-Accountability in Prison Risk Data
Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering.
Becka Hudson, Tomas Percival
doaj +1 more source
Secrecy is common, yet we know little about how it plays out in daily life. Most existing research on secrecy is based on methods involving retrospection over long periods of time, failing to capture secrecy “in the wild”. Filling this gap, we conducted two studies using intensive longitudinal designs to present the first picture of secrecy in everyday
Valentina Bianchi +4 more
openaire +4 more sources
Trade Secrets Definition in the New Iranian Act on Industrial Property: A Comparative Analysis with American Law and the TRIPS Agreement [PDF]
Trade secrets have gained unprecedented importance in all fields of industry and have emerged as a critical component of many firms' intangible assets following the big changes seen during the past decades.
Sayyed Mohammad Hadi Ghabooli Dorafshan +1 more
doaj +1 more source
Seven years ago we collected 20 examples of secrecy surrounding health and the NHS in Britain.1 This month we repeated the exercise, and in three days we have discovered 30 examples. We will be pleased to hear of more. (1) Paragraph 330 of the Terms and Conditions of Service for Hospital Medical and Dental Staff says that “A practitioner shall be free,
openaire +2 more sources

