Results 31 to 40 of about 175,312 (289)

Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming

open access: yesSensors, 2020
This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay.
Van Phu Tuan, Ic-Pyo Hong
doaj   +1 more source

Family Secrecy in Family Therapy Practice: An Explorative Focus Group Study

open access: yesFamily Process, 2018
The aim of this focus group study was to explore the experiences of family therapists working with family secrecy. Our study highlights that family secrets present important and compelling challenges for family therapists. Furthermore, our study reveals that there seem to be some basic strategies family therapists use in dealing with these challenges ...
Deslypere, Eva, Rober, Peter
openaire   +4 more sources

Pembukaan Prinsip Kerahasiaan Bank sebagai Perbuatan Melawan Hukum

open access: yesSASI, 2020
Banking secrecy is known in many countries in the world that has a bank financial institution. Banking secrecy is one of the most important principle. It is because the development and growth of one bank is very dependant on public trust. Confidentiality
Dinda Anna Zatika
doaj   +1 more source

Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels

open access: yes, 2017
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba   +4 more
core   +1 more source

Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

open access: yes, 2017
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu   +4 more
core   +1 more source

Secrets and Secrecy in Calderón's Comedies and in Spanish Golden Age Culture. Outline of a New Research Focus in Calderonian Studies

open access: yesHipogrifo: Revista de Literatura y Cultura del Siglo de Oro, 2013
The public enactment of secrecy is part of the Spanish Golden Age culture. This article presents a research project, which pursues three objectives: 
A study of secrecy as a core characteristic of Spanish Golden Age culture, on the basis of ...
Wolfram Aichinger, Simon Kroll
doaj   +1 more source

A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming

open access: yesIEEE Communications Letters, 2021
Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance analysis on a UAV based system in the presence of a ground eavesdropper/jammer operating in full-duplex mode, where a legitimate ...
Monir Abughalwa, Mazen O. Hasna
openaire   +3 more sources

Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint

open access: yesInternational Journal of Distributed Sensor Networks, 2015
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma   +4 more
doaj   +1 more source

Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery [PDF]

open access: yes, 2015
In this paper, we investigate the achievable secrecy rates in an Energy Harvesting communication system composed of one transmitter and multiple receivers.
Biason, Alessandro   +3 more
core   +1 more source

Mal-Information, the Anatomy of an “Information Disorder”

open access: yesSecrecy and Society
Mal-information is a fairly recent addition to federal policy and the lexicon of political communication with implications for understanding censorship and secrecy during the COVID-19 pandemic. This paper reviews documents authored by IGOs, NGOs, and the
Susan Maret
doaj   +1 more source

Home - About - Disclaimer - Privacy