Results 271 to 280 of about 306,585 (324)
Some of the next articles are maybe not open access.
Physical Layer Security Over Fluid Antenna Systems: Secrecy Performance Analysis
IEEE Transactions on Wireless CommunicationsThis paper investigates the performance of physical layer security (PLS) in fluid antenna-aided communication systems under arbitrary correlated fading channels.
Farshad Rostami Ghadi +5 more
semanticscholar +1 more source
IEEE Transactions on Cognitive Communications and Networking, 2020
In view of the scarcity of spectrum resources in wireless communication, it is studied in this paper over the two-hop cognitive secrecy transmission scheme of decoding and forwarding (DF) unmanned aerial vehicles (UAVs) assisted relay with energy ...
Baofeng Ji +5 more
semanticscholar +1 more source
In view of the scarcity of spectrum resources in wireless communication, it is studied in this paper over the two-hop cognitive secrecy transmission scheme of decoding and forwarding (DF) unmanned aerial vehicles (UAVs) assisted relay with energy ...
Baofeng Ji +5 more
semanticscholar +1 more source
Res: Anthropology and Aesthetics, 1994
The United States government has something like 500 research and development laboratories. They include labs operated by the Department of Agriculture, the Department of Defense, Department of Commerce, Department of Energy and Department of Transportation, as well as national labs and labs of the Atomic Energy Commission.
Ruth C. Young, Joe D. Francis
openaire +2 more sources
The United States government has something like 500 research and development laboratories. They include labs operated by the Department of Agriculture, the Department of Defense, Department of Commerce, Department of Energy and Department of Transportation, as well as national labs and labs of the Atomic Energy Commission.
Ruth C. Young, Joe D. Francis
openaire +2 more sources
, 2020
Building on uncertainty management theory, we develop and test a model explicating how and when secrecy in pay communication may affect employee turnover-related outcomes (i.e., employee turnover i...
Valeria Alterman +5 more
semanticscholar +1 more source
Building on uncertainty management theory, we develop and test a model explicating how and when secrecy in pay communication may affect employee turnover-related outcomes (i.e., employee turnover i...
Valeria Alterman +5 more
semanticscholar +1 more source
2023
Information is not always out there, waiting to be accessed, collected, processed, and revealed. We may be under the impression that information matters because it is made seen, associated and known. After all, the word information describes an act of informing, communicating, and instructing.
+4 more sources
Information is not always out there, waiting to be accessed, collected, processed, and revealed. We may be under the impression that information matters because it is made seen, associated and known. After all, the word information describes an act of informing, communicating, and instructing.
+4 more sources
Annual Review of Anthropology, 2014
Although expansions of state secrecy and the countervailing leaks of classified documents imbue the anthropology of secrecy with urgent relevance, secrecy has a long-standing status as a paradigmatically anthropological topic. In the ethnographic record, initiatory secrets often stand for the quiddity of culture, and the revelation of concealed ...
openaire +2 more sources
Although expansions of state secrecy and the countervailing leaks of classified documents imbue the anthropology of secrecy with urgent relevance, secrecy has a long-standing status as a paradigmatically anthropological topic. In the ethnographic record, initiatory secrets often stand for the quiddity of culture, and the revelation of concealed ...
openaire +2 more sources
2014
Shin has long been one of the most popular forms of Buddhism in Japan. As a devotional tradition that emphasizes gratitude and trust in Amida Buddha, it is thought to have little to do with secrecy. Yet for centuries, Shin Buddhists met on secluded mountains, in homes, and in the backrooms of stores to teach their hidden doctrines and hold clandestine ...
openaire +1 more source
Shin has long been one of the most popular forms of Buddhism in Japan. As a devotional tradition that emphasizes gratitude and trust in Amida Buddha, it is thought to have little to do with secrecy. Yet for centuries, Shin Buddhists met on secluded mountains, in homes, and in the backrooms of stores to teach their hidden doctrines and hold clandestine ...
openaire +1 more source
Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping
IEEE Transactions on Information Forensics and Security, 2020Motivated to understand the increasingly severe threat of unmanned aerial vehicles (UAVs) to the confidentiality of terrestrial radio links, this paper analyzes the ergodic and $\epsilon $ -outage secrecy capacities of the links in the presence of ...
Xin Yuan +5 more
semanticscholar +1 more source
Motivated secrecy: Politics, relationships, and regrets.
, 2020Recent work has explored the dynamics of secrecy and its outcomes, but has yet to examine the motivations people have for engaging in secrecy and how such motivations shape the experience of secrecy and its implications.
Rachel I. McDonald +3 more
semanticscholar +1 more source
Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes
IEEE Transactions on Communications, 2018This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami- $m$ fading channels. Two time slots are utilized to transmit signals from the base station to destination.
Hongjiang Lei +6 more
semanticscholar +1 more source

