Results 261 to 270 of about 48,023,182 (329)
Some of the next articles are maybe not open access.
The Hidden Costs of Securing Innovation: The Manifold Impacts of Compulsory Invention Secrecy
Management Sciences, 2022One of the most commanding powers of the U.S. Patent and Trademark Office (USPTO) is to compel inventions into secrecy, withholding patent rights and prohibiting disclosure, to prevent technology from leaking to foreign competitors.
D. Gross
semanticscholar +1 more source
Secrecy Outage Analysis in NOMA Power Line Communications
IEEE Communications Letters, 2021This letter studies physical layer security (PLS) in non-orthogonal multiple access (NOMA) power line communication (PLC) networks. A source node transmits information to two nodes of near and far users with different power allocations.
R. K. Ahiadormey +4 more
semanticscholar +1 more source
Exact Secrecy Rate Analysis of Antenna Subset Modulation Schemes
IEEE Systems Journal, 2021In this article, we analyze the secrecy rate of a physical-layer security (PLS) algorithm using antenna subset modulation (ASM), which requires significantly lower complexity and cost compared to fully digital beamforming.
Byungha You, In-Ho Lee, Haejoon Jung
semanticscholar +1 more source
ACM Trans. Cyber Phys. Syst., 2020
It is challenging to design a secure and efficient multi-factor authentication scheme for real-time data access in wireless sensor networks. On the one hand, such real-time applications are generally security critical, and various security goals need to ...
Ding Wang, Ping Wang, Chenyu Wang
semanticscholar +1 more source
It is challenging to design a secure and efficient multi-factor authentication scheme for real-time data access in wireless sensor networks. On the one hand, such real-time applications are generally security critical, and various security goals need to ...
Ding Wang, Ping Wang, Chenyu Wang
semanticscholar +1 more source
Secrecy Performance Analysis of RIS-Enabled Wireless Networks Over Rayleigh Fading Channels
2021 Advanced Communication Technologies and Signal Processing (ACTS), 2021This paper examines the secrecy performance of reconfigurable intelligent surface (RIS)-enabled wireless communication systems. In particular, a wiretap communication system is considered which consists of a RIS-enabled access point comprising a large ...
A. Yadav +4 more
semanticscholar +1 more source
Bank Secrecy (A Comparative Study)
Al-Kitab Journal for Human Sciences, 2023Banks usually work to protect the secrets of their customers in order to protect the credit and it is not permissible to disclose these secrets but only in certain cases for the benefit of the credit or in exceptional cases estimated by law. The present study sheds light on the trends of comparative legislation on the protection of bank secrecy between
openaire +1 more source
An Experimental Study of TLS Forward Secrecy Deployments
IEEE Internet Computing, 2014Many Transport Layer Security (TLS) servers use the ephemeral Diffie-Hellman (DHE) key exchange to support forward secrecy. However, in a survey of 473,802 TLS servers, the authors found that 82.9 percent of the DHE-enabled servers use weak DH parameters, resulting in a false sense of security. They compared the server throughput of various TLS setups,
Lin-Shung Huang +3 more
openaire +1 more source
On self‐boundary: A study of the development of the concept of secrecy
British Journal of Medical Psychology, 1988The child's developing concept of a ‘boundary’ between an inner world of ‘self’ and an outer world ‘non‐self’ is central to a number of systems of psychodynamic theory. The notion of boundary is also essential to Piaget. Despite the evident importance of the subject, there have been few attempts to discover the age at which this concept emerges.
R, Meares, W, Orlay
openaire +2 more sources
Secrecy Energy Efficiency in Multi-Antenna SWIPT Networks With Dual-Layer PS Receivers
IEEE Transactions on Wireless Communications, 2020This paper studies the secrecy energy efficiency (SEE) for MISO power-splitting (PS) SWIPT networks in the presence of multiple passive eavesdroppers (Eves), where the non-linear energy harvesting (EH) model and the dual-layer PS receiver architecture ...
Yang Lu +5 more
semanticscholar +1 more source
2021
Abstract Chapter 2 describes the book’s approach to studying networked silence and how people strategically hide their beliefs in some contexts and not in others. It provides details about how the author found CWG, how she gained access to individual members and their meetings, and how she built relationships with members and earned ...
openaire +1 more source
Abstract Chapter 2 describes the book’s approach to studying networked silence and how people strategically hide their beliefs in some contexts and not in others. It provides details about how the author found CWG, how she gained access to individual members and their meetings, and how she built relationships with members and earned ...
openaire +1 more source

