Results 11 to 20 of about 175,312 (289)

Secrecy rate study in two-hop relay channel with finite constellations [PDF]

open access: yes2014 IEEE International Conference on Communications (ICC), 2014
Two-hop security communication with an eavesdropper in wireless environment is a hot research direction. The basic idea is that the destination, simultaneously with the source, sends a jamming signal to interfere the eavesdropper near to or co-located with the relay. Similar as physical layer network coding, the friendly jamming signal will prevent the
Qu, Zhen   +3 more
openaire   +2 more sources

Permissible Restrictions of Bank Secrecy for Tax Control Purposes in the Legal System of the Russian Federation

open access: yesFinancial Law Review, 2021
The article deals with the relationship between bank secrecy and tax transparency. It studies the issues of confidential information (which forms bank secrecy) being presented to tax authorities, also
Elena Vyacheslavovna Pokachalova   +2 more
doaj   +1 more source

Constraints on gene patent protection fuel secrecy concerns: a qualitative study [PDF]

open access: yesJournal of Law and the Biosciences, 2017
Concern is mounting that innovators are responding to recent changes in patent eligibility by increasingly choosing to protect their discoveries as trade secrets. Due to the clandestine nature of trade secrets, it is impossible to quantify the extent to which innovators actually elect to protect their inventions as trade secrets rather than patents ...
Guerrini, Christi J   +4 more
openaire   +2 more sources

Secrecy Analysis of Directional mmWave UAV-Based Links Under Hovering Fluctuations

open access: yesIEEE Open Journal of the Communications Society, 2023
Recent developments in Unmanned Aerial Vehicles (UAVs) technology have paved the way to their utilization in different fields and applications. Among these applications, UAVs have been widely investigated as a good candidate to serve as mobile base ...
Saud Althunibat   +3 more
doaj   +1 more source

How much the act of secrecy is done by medical staff? A descriptive cross-sectional survey in south of Iran [PDF]

open access: yes, 2015
Some information may be gathered during the medical procedures, including medical records or personal information. Many of them can be considered as secrets.
Deylami, M.   +3 more
core   +1 more source

Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users

open access: yesElectronics Letters, 2022
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang   +4 more
doaj   +1 more source

Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay [PDF]

open access: yes, 2013
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper.
Jianhua Mo   +5 more
core   +1 more source

Engagement against/for secrecy [PDF]

open access: yesFilozofija i Društvo, 2016
This essay discusses engagement against state secrecy and engagement for secrecy, free from interference. By exploring divisions introduced by state secrecy (through exclusion, subjection and oppression), it identifies the distortions of equal ...
Losoncz Mark
doaj   +1 more source

Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization [PDF]

open access: yes, 2013
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to design an artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is maximized subject to the sum power constraint. AN-aided secure transmission has
Li, Qiang, Ma, Wing-Kin
core   +1 more source

Joint Impact of Nodes Mobility and Imperfect Channel Estimates on the Secrecy Performance of Cognitive Radio Vehicular Networks Over Nakagami-m Fading Channels

open access: yesIEEE Open Journal of Vehicular Technology, 2021
This paper investigates the joint impact of nodes’ mobility and imperfect channel estimates on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami-m fading channels.
Anshul Pandey, Suneel Yadav
doaj   +1 more source

Home - About - Disclaimer - Privacy