Results 31 to 40 of about 175,312 (289)
This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay.
Van Phu Tuan, Ic-Pyo Hong
doaj +1 more source
Family Secrecy in Family Therapy Practice: An Explorative Focus Group Study
The aim of this focus group study was to explore the experiences of family therapists working with family secrecy. Our study highlights that family secrets present important and compelling challenges for family therapists. Furthermore, our study reveals that there seem to be some basic strategies family therapists use in dealing with these challenges ...
Deslypere, Eva, Rober, Peter
openaire +4 more sources
Pembukaan Prinsip Kerahasiaan Bank sebagai Perbuatan Melawan Hukum
Banking secrecy is known in many countries in the world that has a bank financial institution. Banking secrecy is one of the most important principle. It is because the development and growth of one bank is very dependant on public trust. Confidentiality
Dinda Anna Zatika
doaj +1 more source
Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba +4 more
core +1 more source
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu +4 more
core +1 more source
The public enactment of secrecy is part of the Spanish Golden Age culture. This article presents a research project, which pursues three objectives: A study of secrecy as a core characteristic of Spanish Golden Age culture, on the basis of ...
Wolfram Aichinger, Simon Kroll
doaj +1 more source
A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance analysis on a UAV based system in the presence of a ground eavesdropper/jammer operating in full-duplex mode, where a legitimate ...
Monir Abughalwa, Mazen O. Hasna
openaire +3 more sources
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma +4 more
doaj +1 more source
Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery [PDF]
In this paper, we investigate the achievable secrecy rates in an Energy Harvesting communication system composed of one transmitter and multiple receivers.
Biason, Alessandro +3 more
core +1 more source
Mal-Information, the Anatomy of an “Information Disorder”
Mal-information is a fairly recent addition to federal policy and the lexicon of political communication with implications for understanding censorship and secrecy during the COVID-19 pandemic. This paper reviews documents authored by IGOs, NGOs, and the
Susan Maret
doaj +1 more source

