Results 1 to 10 of about 175,312 (289)
The Charm of Secrecy: Secrecy and Society as Secrecy Studies [PDF]
Maret, Susan
core +7 more sources
Intelligent reflecting surface backscatter-enabled physical layer security enhancement via deep reinforcement learning [PDF]
This article introduces a novel strategy for wireless communication security utilizing intelligent reflecting surfaces (IRS). The IRS is strategically deployed to mitigate jamming attacks and eavesdropper threats while improving signal reception for ...
Manzoor Ahmed +7 more
doaj +3 more sources
Six Answers to the Question “What is Secrecy Studies?”
Clare Birchall
doaj +5 more sources
This article contributes to ongoing attempts to broaden out theorizations of secrecy from an intentional and willful act of concealment to a cultural and structural process. We do so by fostering a conversation between secrecy and curiosity.
Clare Stevens +3 more
doaj +1 more source
(Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices
This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose
Lilly P. Muller , Natalie Welfens
doaj +1 more source
Introduction to the Special Issue on Secrecy and Technologies
Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness.
Clare Stevens, Sam Forsythe
doaj +1 more source
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun +4 more
openaire +2 more sources
Realistic Secrecy Performance Analysis for LiFi Systems
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud +3 more
doaj +1 more source
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source
Organizational secrecy as viewed by the agents of a multinational corporation: A Case Study [PDF]
: Only a limited number of theoretical studies have been conducted with regards to the issue of organizational secrecy. This study examines similar and different views about secrecy within three executive levels of an industrial multinational ...
Homero Cremm Busnelo +1 more
doaj +1 more source

