Results 261 to 270 of about 48,023,182 (329)
Some of the next articles are maybe not open access.

The Hidden Costs of Securing Innovation: The Manifold Impacts of Compulsory Invention Secrecy

Management Sciences, 2022
One of the most commanding powers of the U.S. Patent and Trademark Office (USPTO) is to compel inventions into secrecy, withholding patent rights and prohibiting disclosure, to prevent technology from leaking to foreign competitors.
D. Gross
semanticscholar   +1 more source

Secrecy Outage Analysis in NOMA Power Line Communications

IEEE Communications Letters, 2021
This letter studies physical layer security (PLS) in non-orthogonal multiple access (NOMA) power line communication (PLC) networks. A source node transmits information to two nodes of near and far users with different power allocations.
R. K. Ahiadormey   +4 more
semanticscholar   +1 more source

Exact Secrecy Rate Analysis of Antenna Subset Modulation Schemes

IEEE Systems Journal, 2021
In this article, we analyze the secrecy rate of a physical-layer security (PLS) algorithm using antenna subset modulation (ASM), which requires significantly lower complexity and cost compared to fully digital beamforming.
Byungha You, In-Ho Lee, Haejoon Jung
semanticscholar   +1 more source

Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs

ACM Trans. Cyber Phys. Syst., 2020
It is challenging to design a secure and efficient multi-factor authentication scheme for real-time data access in wireless sensor networks. On the one hand, such real-time applications are generally security critical, and various security goals need to ...
Ding Wang, Ping Wang, Chenyu Wang
semanticscholar   +1 more source

Secrecy Performance Analysis of RIS-Enabled Wireless Networks Over Rayleigh Fading Channels

2021 Advanced Communication Technologies and Signal Processing (ACTS), 2021
This paper examines the secrecy performance of reconfigurable intelligent surface (RIS)-enabled wireless communication systems. In particular, a wiretap communication system is considered which consists of a RIS-enabled access point comprising a large ...
A. Yadav   +4 more
semanticscholar   +1 more source

Bank Secrecy (A Comparative Study)

Al-Kitab Journal for Human Sciences, 2023
Banks usually work to protect the secrets of their customers in order to protect the credit and it is not permissible to disclose these secrets but only in certain cases for the benefit of the credit or in exceptional cases estimated by law. The present study sheds light on the trends of comparative legislation on the protection of bank secrecy between
openaire   +1 more source

An Experimental Study of TLS Forward Secrecy Deployments

IEEE Internet Computing, 2014
Many Transport Layer Security (TLS) servers use the ephemeral Diffie-Hellman (DHE) key exchange to support forward secrecy. However, in a survey of 473,802 TLS servers, the authors found that 82.9 percent of the DHE-enabled servers use weak DH parameters, resulting in a false sense of security. They compared the server throughput of various TLS setups,
Lin-Shung Huang   +3 more
openaire   +1 more source

On self‐boundary: A study of the development of the concept of secrecy

British Journal of Medical Psychology, 1988
The child's developing concept of a ‘boundary’ between an inner world of ‘self’ and an outer world ‘non‐self’ is central to a number of systems of psychodynamic theory. The notion of boundary is also essential to Piaget. Despite the evident importance of the subject, there have been few attempts to discover the age at which this concept emerges.
R, Meares, W, Orlay
openaire   +2 more sources

Secrecy Energy Efficiency in Multi-Antenna SWIPT Networks With Dual-Layer PS Receivers

IEEE Transactions on Wireless Communications, 2020
This paper studies the secrecy energy efficiency (SEE) for MISO power-splitting (PS) SWIPT networks in the presence of multiple passive eavesdroppers (Eves), where the non-linear energy harvesting (EH) model and the dual-layer PS receiver architecture ...
Yang Lu   +5 more
semanticscholar   +1 more source

Studying Political Secrecy

2021
Abstract Chapter 2 describes the book’s approach to studying networked silence and how people strategically hide their beliefs in some contexts and not in others. It provides details about how the author found CWG, how she gained access to individual members and their meetings, and how she built relationships with members and earned ...
openaire   +1 more source

Home - About - Disclaimer - Privacy