Results 21 to 30 of about 175,312 (289)

Teaching Trade Secret Management with Threshold Concepts

open access: yesSecrecy and Society, 2021
Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration.
Haakon Thue Lie   +2 more
doaj  

Secrecy Performance Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems

open access: yesIEEE Access, 2020
This paper studies physical layer security for two-way relay non-orthogonal multiple access systems. Specifically, by employing a decode-and-forward relay and considering both the maximum-ratio combining and selection combining schemes at the ...
Mahendra K. Shukla   +2 more
doaj   +1 more source

Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

open access: yesIEEE Access, 2018
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi   +5 more
doaj   +1 more source

ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

open access: yesIEEE Access, 2023
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes.
M. Sazadur Rahman   +5 more
doaj   +1 more source

On Competition and the Strategic Management of Intellectual Property in Oligopoly [PDF]

open access: yes, 2009
An innovative firm with private information about its indivisible process innovation chooses strategically whether to apply for a patent with probabilistic validity or rely on secrecy.
Jansen, Jos
core   +1 more source

Concealing in the Public Interest, or Why We Must Teach Secrecy

open access: yesSecrecy and Society, 2021
Secrecy as the intentional or unintentional concealment of information is the subject of investigation within the humanities, social sciences, journalism, law and legal studies.
Susan Maret
doaj  

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

open access: yesIEEE Access, 2018
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu   +3 more
doaj   +1 more source

Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]

open access: yesJisuanji gongcheng, 2019
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj   +1 more source

Secrecy outage probability and diversity order of Alamouti STBC over time-selective fading channels

open access: yesICT Express, 2023
This paper studies physical layer security for Alamouti space–time block code (STBC) with joint maximum likelihood (JML) or zero forcing (ZF) detection techniques particularly over multi-input single-output (MISO) wiretap time-selective Rayleigh fading ...
Seong Ho Chae, Hoojin Lee
doaj   +1 more source

Open secrets [PDF]

open access: yes, 2010
The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand.
Madison, MJ
core   +1 more source

Home - About - Disclaimer - Privacy