Electroanalytical Eavesdropping on Single Cell Communication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eavesdropping and Jamming Communication Networks

Eavesdropping and jamming communication networks is an important part of any military engagement. However, until recently there has been very limited research in this area. Two recent papers by Commander et al. [2, 3] addressing this problem represent the current state-of-the-art in the study of the WIRELESS NETWORK JAMMING PROBLEM. In this chapter, we survey the problem and highlight the resul...

متن کامل

Eavesdropping on the "ping-pong" quantum communication protocol.

Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...

متن کامل

Eavesdropping on Communication Patterns in Two Token Teams

In a national research project we assessed gender-related communicative patterns in 20 teams from diverse organizations. The sub-sample for this study consisted of two teams with one gender token each: a female token in an industrial team of eleven persons and a male token in a kindergarten team of eight persons. We focused on dominance and support-related behaviour in verbal and nonverbal comm...

متن کامل

Eavesdropping on Memory.

For more than four decades, I have been studying human memory. My research concerns the malleable nature of memory. Information suggested to an individual about an event can be integrated with the memory of the event itself, so that what actually occurred, and what was discussed later about what may have occurred, become inextricably interwoven, allowing distortion, elaboration, and even total ...

متن کامل

Eavesdropping on the Smart Grid

An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Analytical Chemistry

سال: 2011

ISSN: 0003-2700,1520-6882

DOI: 10.1021/ac200666c