Results 21 to 30 of about 306,585 (324)
This paper surveys tax haven legislation and links the literature on tax havens to the literature on asymmetric information. I argue that the core aim of tax haven legislation is to create private information (secrecy) for the users of tax havens. This leads to moral hazard and transaction costs in non-havens.
openaire +4 more sources
On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi +2 more
core +3 more sources
Carceral Data: The Limits of Transparency-as-Accountability in Prison Risk Data
Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering.
Becka Hudson, Tomas Percival
doaj +1 more source
Source-Channel Secrecy with Causal Disclosure [PDF]
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul +3 more
core +1 more source
Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks [PDF]
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments.
Huiming Wang +3 more
semanticscholar +1 more source
Secrecy by Design With Applications to Privacy and Compression
Secrecy by design is examined as an approach to information-theoretic secrecy. The main idea behind this approach is to design an information processing system from the ground up to be perfectly secure with respect to an explicit secrecy constraint.
Yanina Y. Shkel, Rick S. Blum, H. Poor
semanticscholar +1 more source
Achievable Secrecy Rates of an Energy Harvesting Device [PDF]
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro +2 more
core +2 more sources
Trade Secrets Definition in the New Iranian Act on Industrial Property: A Comparative Analysis with American Law and the TRIPS Agreement [PDF]
Trade secrets have gained unprecedented importance in all fields of industry and have emerged as a critical component of many firms' intangible assets following the big changes seen during the past decades.
Sayyed Mohammad Hadi Ghabooli Dorafshan +1 more
doaj +1 more source
Secrecy Outage Probability Analysis for RIS-Assisted NOMA Systems [PDF]
In this Letter, the physical layer security for a novel reconfigurable intelligent surface (RIS)-assisted non-orthogonal multiple access (NOMA) system in a multi-user scenario is investigated, where the authors consider the worst case that the ...
Liang Yang, Yongjie Yuan
semanticscholar +1 more source
In the past few years numerous secret transgressions and crimes have been revealed in the media. Whistleblowers reveal clandestine agreements between managers and directors of large companies; criminals (pentiti) make deals with criminal justice ...
Dina Siegel
doaj +1 more source

