UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 8,662
1.
  • Dissimulation and the Cultu... Dissimulation and the Culture of Secrecy in Early Modern Europe
    Snyder, Jon R 07/2009
    eBook

    “Larvatus prodeo,” announced René Descartes at the beginning of the seventeenth century: “I come forward, masked.” Deliberately disguising or silencing their most intimate thoughts and emotions, many ...
Full text
2.
Full text
3.
  • Radical Secrecy Radical Secrecy
    Birchall, Clare 04/2021, Volume: 60
    eBook
    Peer reviewed

    Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the ...
Full text
4.
  • Secrecy Performance Analysi... Secrecy Performance Analysis of Mixed α − μ and Exponentiated Weibull RF-FSO Cooperative Relaying System
    Juel, Nazmul Hassan; Badrudduza, A. S. M.; Islam, S. M. Riazul ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    Increasing concerns regarding wireless systems' security are leading researchers to exploit the physical properties of a medium while designing any secured wireless network. The secrecy performance ...
Full text

PDF
5.
  • Effect of Interfering Trans... Effect of Interfering Transmitter on the Secrecy of Diffusive Molecular Timing Channels
    Sharma, Gaurav; Mallik, Ranjan K.; Pandey, Nilay ... IEEE transactions on communications, 06/2024, Volume: 72, Issue: 6
    Journal Article
    Peer reviewed

    This paper investigates the information-theoretic security of multi-particle diffusive molecular timing (DMT) channels for noise-limited and interference-limited scenarios. By utilizing a channel ...
Full text
6.
  • Secrecy outage analysis of ... Secrecy outage analysis of satellite communication networks with hardware impairments and channel estimation errors
    Zhou, Feng; Wang, Rugang; Guo, Kefeng Electronics letters, 09/2020, Volume: 56, Issue: 20
    Journal Article
    Peer reviewed
    Open access

    This Letter investigates the impacts of hardware impairments (HIs) and channel estimation errors (CEEs) on the secrecy performance of satellite communication networks with one legitimate user and one ...
Full text

PDF
7.
  • Secrecy Performance Analysi... Secrecy Performance Analysis of Backscatter Communications with Side Information
    Kaveh, Masoud; Rostami Ghadi, Farshad; Jäntti, Riku ... Sensors (Basel, Switzerland), 10/2023, Volume: 23, Issue: 20
    Journal Article
    Peer reviewed
    Open access

    Backscatter communication (BC) systems are a promising technology for internet of things (IoT) applications that allow devices to transmit information by modulating ambient radio signals without the ...
Full text
8.
  • Secrecy Rate Maximization f... Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications
    Shen, Hong; Xu, Wei; Gong, Shulei ... IEEE communications letters, 09/2019, Volume: 23, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    We investigate transmission optimization for intelligent reflecting surface (IRS) assisted multi-antenna systems from the physical-layer security perspective. The design goal is to maximize the ...
Full text

PDF
9.
  • Secrecy performance analysi... Secrecy performance analysis over cascaded fading channels
    Ata, Serdar Ö IET communications, 01/2019, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    In this study, the authors investigate the secrecy performance at the physical layer of wireless communication systems where the channels are modelled as cascaded fading channels, in which the fading ...
Full text

PDF
10.
  • Secrecy Performance Analysi... Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems
    Yang, Liang; Yang, Jinxia; Xie, Wenwu ... IEEE transactions on vehicular technology, 10/2020, Volume: 69, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user. Specifically, we assume ...
Full text

PDF
1 2 3 4 5
hits: 8,662

Load filters