Results 21 to 30 of about 48,023,182 (329)

Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users

open access: yesElectronics Letters, 2022
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang   +4 more
doaj   +1 more source

Engagement against/for secrecy [PDF]

open access: yesFilozofija i Društvo, 2016
This essay discusses engagement against state secrecy and engagement for secrecy, free from interference. By exploring divisions introduced by state secrecy (through exclusion, subjection and oppression), it identifies the distortions of equal ...
Losoncz Mark
doaj   +1 more source

How much the act of secrecy is done by medical staff? A descriptive cross-sectional survey in south of Iran [PDF]

open access: yes, 2015
Some information may be gathered during the medical procedures, including medical records or personal information. Many of them can be considered as secrets.
Deylami, M.   +3 more
core   +1 more source

Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay [PDF]

open access: yes, 2013
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper.
Jianhua Mo   +5 more
core   +1 more source

Secrecy rate study in two-hop relay channel with finite constellations [PDF]

open access: yes2014 IEEE International Conference on Communications (ICC), 2014
Two-hop security communication with an eavesdropper in wireless environment is a hot research direction. The basic idea is that the destination, simultaneously with the source, sends a jamming signal to interfere the eavesdropper near to or co-located with the relay. Similar as physical layer network coding, the friendly jamming signal will prevent the
Zhen Qu   +3 more
openaire   +2 more sources

Joint Impact of Nodes Mobility and Imperfect Channel Estimates on the Secrecy Performance of Cognitive Radio Vehicular Networks Over Nakagami-m Fading Channels

open access: yesIEEE Open Journal of Vehicular Technology, 2021
This paper investigates the joint impact of nodes’ mobility and imperfect channel estimates on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami-m fading channels.
Anshul Pandey, Suneel Yadav
doaj   +1 more source

Teaching Trade Secret Management with Threshold Concepts

open access: yesSecrecy and Society, 2021
Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration.
Haakon Thue Lie   +2 more
doaj  

Secrecy outage probability and diversity order of Alamouti STBC over time-selective fading channels

open access: yesICT Express, 2023
This paper studies physical layer security for Alamouti space–time block code (STBC) with joint maximum likelihood (JML) or zero forcing (ZF) detection techniques particularly over multi-input single-output (MISO) wiretap time-selective Rayleigh fading ...
Seong Ho Chae, Hoojin Lee
doaj   +1 more source

Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

open access: yesIEEE Access, 2018
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi   +5 more
doaj   +1 more source

A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming

open access: yesIEEE Communications Letters, 2021
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance analysis on a UAV based system in the presence of a ground eavesdropper/jammer operating in full-duplex mode, where a legitimate ...
Monir Abughalwa, Mazen O. Hasna
openaire   +3 more sources

Home - About - Disclaimer - Privacy