中图分类
执行
    中文(共42篇) 外文(共1670篇)
    排序:
    导出 保存至文件
    [机翻] 无线网络的速率、保密性和网络连通性权衡
    [期刊]   Ruolin Zhang   Cristina Comaniciu   H. Vincent Poor   《IEEE communications letters》    2016年20卷8期      共4页
    摘要 : A new approach to the characterization of network connectivity under transmission rate and secrecy constraints is proposed, based on a rate-secrecy graph model. The proposed model is based on an information theoretic framework, an... 展开

    [机翻] 保密管理的动态观
    [期刊]   Bos, Brenda   Broekhuizen, Thijs L. J.   de Faria, Pedro   《Journal of Business Research》    2015年68卷12期      共9页
    摘要 : Purpose - The current study provides a literature review on secrecy as mechanism for appropriating value from innovation. It synthesizes previous findings into a framework that can explain the advantages of exercising secrecy vers... 展开

    摘要 : Analyzing wireless communication performances by using information-theoretic results is of practical importance. In this paper, first, an achievable secrecy rate region and an outer bound on the secrecy capacity region for the dis... 展开

    摘要 : While scholarly literature has paid attention to human intelligence professionalism from the perspective of the agent handler, we know relatively little about the precarious positions in which (double) agents often find themselves... 展开
    关键词 : SECRECY  

    [期刊]   Caulfield, Matthew   《Journal of Business Ethics》    2021年171卷2期      共22页
    摘要 : A question facing nearly all private firms is whether they may keep employee pay secret. Many think it is obvious that firms are obligated to disclose a good deal of pay information once we properly appreciate the severity of pay ... 展开

    [机翻] 关于符号和密码保密的
    [期刊]   Backes, M.   Pfitzmann, B.   《IEEE transactions on dependable and secure computing》    2005年2卷2期      共15页
    摘要 : We investigate the relation between symbolic and cryptographic secrecy properties for cryptographic protocols. Symbolic secrecy of payload messages or exchanged keys is arguably the most important notion of secrecy shown with auto... 展开

    [机翻] 一种在没有干扰波束形成器的情况下利用空间分集和物理层安全的方法
    [期刊]   Tran, True Thanh   Kong, Hyung Yun   《Communications and Networks, Journal of》    2015年17卷5期      共9页
    摘要 : This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming ... 展开

    [期刊]   Ji Young Chun   Dong Hoon Lee   Jung Yeon Hwang   《Wireless communications & mobile computing》    2009年9卷12期      共7页
    摘要 : Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography. We show that the GKM... 展开

    [机翻] 中断约束下mimom组播监听信道的保密率最大化
    摘要 : In this letter, we investigate a robust transmit optimization design based on an artificial noise (AN)-aided precoding scheme for maximizing secrecy rate in a multiple-input multiple-output multiple-eavesdropper multicast network ... 展开

    [机翻] 协作ARQ中的可靠性安全权衡与保密吞吐量
    [期刊]   Guan, Xinrong   Cai, Yueming   Yang, Weiwei   《IEEE communications letters》    2014年18卷3期      共4页
    摘要 : This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this pap... 展开

    研究趋势
    相关热图
    学科分类