Results 21 to 30 of about 48,023,182 (329)
Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang +4 more
doaj +1 more source
Engagement against/for secrecy [PDF]
This essay discusses engagement against state secrecy and engagement for secrecy, free from interference. By exploring divisions introduced by state secrecy (through exclusion, subjection and oppression), it identifies the distortions of equal ...
Losoncz Mark
doaj +1 more source
How much the act of secrecy is done by medical staff? A descriptive cross-sectional survey in south of Iran [PDF]
Some information may be gathered during the medical procedures, including medical records or personal information. Many of them can be considered as secrets.
Deylami, M. +3 more
core +1 more source
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay [PDF]
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper.
Jianhua Mo +5 more
core +1 more source
Secrecy rate study in two-hop relay channel with finite constellations [PDF]
Two-hop security communication with an eavesdropper in wireless environment is a hot research direction. The basic idea is that the destination, simultaneously with the source, sends a jamming signal to interfere the eavesdropper near to or co-located with the relay. Similar as physical layer network coding, the friendly jamming signal will prevent the
Zhen Qu +3 more
openaire +2 more sources
This paper investigates the joint impact of nodes’ mobility and imperfect channel estimates on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami-m fading channels.
Anshul Pandey, Suneel Yadav
doaj +1 more source
Teaching Trade Secret Management with Threshold Concepts
Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration.
Haakon Thue Lie +2 more
doaj
Secrecy outage probability and diversity order of Alamouti STBC over time-selective fading channels
This paper studies physical layer security for Alamouti space–time block code (STBC) with joint maximum likelihood (JML) or zero forcing (ZF) detection techniques particularly over multi-input single-output (MISO) wiretap time-selective Rayleigh fading ...
Seong Ho Chae, Hoojin Lee
doaj +1 more source
Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi +5 more
doaj +1 more source
A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance analysis on a UAV based system in the presence of a ground eavesdropper/jammer operating in full-duplex mode, where a legitimate ...
Monir Abughalwa, Mazen O. Hasna
openaire +3 more sources

