Results 11 to 20 of about 175,312 (289)
Secrecy rate study in two-hop relay channel with finite constellations [PDF]
Two-hop security communication with an eavesdropper in wireless environment is a hot research direction. The basic idea is that the destination, simultaneously with the source, sends a jamming signal to interfere the eavesdropper near to or co-located with the relay. Similar as physical layer network coding, the friendly jamming signal will prevent the
Qu, Zhen +3 more
openaire +2 more sources
The article deals with the relationship between bank secrecy and tax transparency. It studies the issues of confidential information (which forms bank secrecy) being presented to tax authorities, also
Elena Vyacheslavovna Pokachalova +2 more
doaj +1 more source
Constraints on gene patent protection fuel secrecy concerns: a qualitative study [PDF]
Concern is mounting that innovators are responding to recent changes in patent eligibility by increasingly choosing to protect their discoveries as trade secrets. Due to the clandestine nature of trade secrets, it is impossible to quantify the extent to which innovators actually elect to protect their inventions as trade secrets rather than patents ...
Guerrini, Christi J +4 more
openaire +2 more sources
Secrecy Analysis of Directional mmWave UAV-Based Links Under Hovering Fluctuations
Recent developments in Unmanned Aerial Vehicles (UAVs) technology have paved the way to their utilization in different fields and applications. Among these applications, UAVs have been widely investigated as a good candidate to serve as mobile base ...
Saud Althunibat +3 more
doaj +1 more source
How much the act of secrecy is done by medical staff? A descriptive cross-sectional survey in south of Iran [PDF]
Some information may be gathered during the medical procedures, including medical records or personal information. Many of them can be considered as secrets.
Deylami, M. +3 more
core +1 more source
Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang +4 more
doaj +1 more source
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay [PDF]
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper.
Jianhua Mo +5 more
core +1 more source
Engagement against/for secrecy [PDF]
This essay discusses engagement against state secrecy and engagement for secrecy, free from interference. By exploring divisions introduced by state secrecy (through exclusion, subjection and oppression), it identifies the distortions of equal ...
Losoncz Mark
doaj +1 more source
Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization [PDF]
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to design an artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is maximized subject to the sum power constraint. AN-aided secure transmission has
Li, Qiang, Ma, Wing-Kin
core +1 more source
This paper investigates the joint impact of nodes’ mobility and imperfect channel estimates on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami-m fading channels.
Anshul Pandey, Suneel Yadav
doaj +1 more source

