Electroanalytical Eavesdropping on Single Cell Communication
نویسندگان
چکیده
منابع مشابه
Eavesdropping and Jamming Communication Networks
Eavesdropping and jamming communication networks is an important part of any military engagement. However, until recently there has been very limited research in this area. Two recent papers by Commander et al. [2, 3] addressing this problem represent the current state-of-the-art in the study of the WIRELESS NETWORK JAMMING PROBLEM. In this chapter, we survey the problem and highlight the resul...
متن کاملEavesdropping on the "ping-pong" quantum communication protocol.
Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...
متن کاملEavesdropping on Communication Patterns in Two Token Teams
In a national research project we assessed gender-related communicative patterns in 20 teams from diverse organizations. The sub-sample for this study consisted of two teams with one gender token each: a female token in an industrial team of eleven persons and a male token in a kindergarten team of eight persons. We focused on dominance and support-related behaviour in verbal and nonverbal comm...
متن کاملEavesdropping on Memory.
For more than four decades, I have been studying human memory. My research concerns the malleable nature of memory. Information suggested to an individual about an event can be integrated with the memory of the event itself, so that what actually occurred, and what was discussed later about what may have occurred, become inextricably interwoven, allowing distortion, elaboration, and even total ...
متن کاملEavesdropping on the Smart Grid
An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Analytical Chemistry
سال: 2011
ISSN: 0003-2700,1520-6882
DOI: 10.1021/ac200666c