Results 221 to 230 of about 133,625 (274)
Simultaneous transmission of information and key exchange using the same photonic quantum states. [PDF]
Pan D +9 more
europepmc +1 more source
Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array. [PDF]
Wu X, Shao H, Lin J, Pan Y, Xiong W.
europepmc +1 more source
A hybrid multi-node QKD-ECC architecture for securing IoT networks. [PDF]
Chaturvedi R +7 more
europepmc +1 more source
'We truly feel limited': nurses and midwives' perspectives on multi-level factors influencing women's adherence to ANC in Rwanda: a qualitative study. [PDF]
Tengera O +5 more
europepmc +1 more source
Loving in Secret, Grieving in Silence: Emotion-Focused Therapy With the Other Woman After an Affair in a Japanese Cultural Context. [PDF]
Iwakabe S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023
Having seized state power, the Bolsheviks pursued twin goals: to gain exclusive control of the state and the expansion of its capacities. The chapter reviews the various meanings and dimensions of “state capacity” and illustrates unique aspects of the capacity of communist states during the Cold War. Secrecy contributed to both twin goals, but beyond a
openaire +2 more sources
Having seized state power, the Bolsheviks pursued twin goals: to gain exclusive control of the state and the expansion of its capacities. The chapter reviews the various meanings and dimensions of “state capacity” and illustrates unique aspects of the capacity of communist states during the Cold War. Secrecy contributed to both twin goals, but beyond a
openaire +2 more sources
MIMOME channel secrecy capacity
2008 11th International Conference on Computer and Information Technology, 2008Although conventional cryptographic security mechanisms are essential to the overall problem of security, the openness of wireless medium poses both threats and opportunities for securing transmission. Information theoretic security is attracting researchers for its robust nature.
Mohammad Rakibul Islam +2 more
openaire +1 more source
On Multiterminal Secrecy Capacities
2007 IEEE International Symposium on Information Theory, 2007Shannon-theoretic secret key generation by several parties is considered for source models in which the distinct components of a multiple source observed separately by multiple terminals, and for channel models in which a secure noisy channel with one input terminal and multiple output terminals, and, additionally in both cases, a public noiseless ...
Imre Csiszar, Prakash Narayan
openaire +1 more source
Secrecy capacities for multiterminal channel models
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2005Shannon-theoretic secret key generation by several parties is considered for models in which a secure noisy channel with one input terminal and multiple output terminals and a public noiseless channel of unlimited capacity are available for accomplishing this goal.
Imre Csiszar, Prakash Narayan
openaire +1 more source

