Results 1 to 10 of about 175,312 (289)

Intelligent reflecting surface backscatter-enabled physical layer security enhancement via deep reinforcement learning [PDF]

open access: yesPeerJ Computer Science
This article introduces a novel strategy for wireless communication security utilizing intelligent reflecting surfaces (IRS). The IRS is strategically deployed to mitigate jamming attacks and eavesdropper threats while improving signal reception for ...
Manzoor Ahmed   +7 more
doaj   +3 more sources

Being Curious with Secrecy

open access: yesSecrecy and Society, 2023
This article contributes to ongoing attempts to broaden out theorizations of secrecy from an intentional and willful act of concealment to a cultural and structural process. We do so by fostering a conversation between secrecy and curiosity.
Clare Stevens   +3 more
doaj   +1 more source

(Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices

open access: yesSecrecy and Society, 2023
This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose
Lilly P. Muller , Natalie Welfens
doaj   +1 more source

Introduction to the Special Issue on Secrecy and Technologies

open access: yesSecrecy and Society, 2023
Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness.
Clare Stevens, Sam Forsythe
doaj   +1 more source

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

open access: yesIEEE Internet of Things Journal, 2023
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun   +4 more
openaire   +2 more sources

Realistic Secrecy Performance Analysis for LiFi Systems

open access: yesIEEE Access, 2021
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud   +3 more
doaj   +1 more source

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Organizational secrecy as viewed by the agents of a multinational corporation: A Case Study [PDF]

open access: yesGestão & Produção, 2021
: Only a limited number of theoretical studies have been conducted with regards to the issue of organizational secrecy. This study examines similar and different views about secrecy within three executive levels of an industrial multinational ...
Homero Cremm Busnelo   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy