Results 21 to 30 of about 275,240 (330)

Secrecy vignettes [PDF]

open access: yes, 2019
Research objective: This chapter helps researchers who want their academic writing to include explicit accounts of the ways in which they navigated secrecy and its ethical dilemmas in their fieldwork. It proposes that one way of including such accounts is by way of ‘secrecy vignettes’.
openaire   +3 more sources

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Knowledge Bases and Representation Learning Towards Bug Triaging

open access: yesMachine Learning and Knowledge Extraction
A large number of bug reports are submitted by users and developers in bug-tracking system every day. It is time-consuming for software maintainers to assign bug reports to appropriate developers for fixing manually.
Qi Wang   +6 more
doaj   +1 more source

Liens sociaux, secrets et confidences. Le cas des femmes migrantes d’Afrique subsaharienne et séropositives

open access: yesRecherches Sociologiques et Anthropologiques, 2014
Hiv-positive women migrating from sub-Saharan Africa combine vulnerabilities. Based on qualitative research carried out among 30 hiv-positive women, this article proposes to analyse how they integrate themselves into various social spheres (familial ...
Francesca Poglia Mileti   +4 more
doaj   +1 more source

Indiens sur scènes, étrangers captivés ? Mise en spectacle de la culture et secret

open access: yesNuevo mundo - Mundos Nuevos, 2017
This session draws on patrimonialisation cases which depend upon the support of a visual spectacle, either live or on film, and which thus implicitly define culture as a set of visual practices susceptible to observation.
Philippe Erikson   +2 more
doaj   +1 more source

Vehicle Communication using Secrecy Capacity

open access: yes, 2018
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang   +17 more
core   +1 more source

Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery [PDF]

open access: yes, 2015
In this paper, we investigate the achievable secrecy rates in an Energy Harvesting communication system composed of one transmitter and multiple receivers.
Biason, Alessandro   +3 more
core   +1 more source

Multipartite Classical and Quantum Secrecy Monotones [PDF]

open access: yes, 2002
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl   +22 more
core   +2 more sources

Maximal Correlation Secrecy [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
This paper shows that the Hirschfeld-Gebelein-R nyi maximal correlation between the message and the ciphertext provides good secrecy guarantees for cryptosystems that use short keys. We first establish a bound on the eavesdropper's advantage in guessing functions of the message in terms of maximal correlation and the R nyi entropy of the message ...
Cheuk Ting Li, Abbas El Gamal
openaire   +2 more sources

Joint Beamforming Design and Power Minimization for Friendly Jamming Relaying Hybrid RF/VLC Systems

open access: yesIEEE Photonics Journal, 2019
In this paper, we study physical layer security (PLS) aspects of a hybrid radio frequency (RF)/visible light communication (VLC) system with multiple decode-and-forward relaying nodes equipped with friendly jamming capabilities.
Jaber Al-Khori   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy