نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

1999
Dennis M. Volpano

After looking at the security literature, you will nd secrecy is formalized in diierent ways, depending on the application. Applications have threat models that innuence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this panel is to foster discussion on what sorts of secrecy prop...

1996
L. Robbins

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural deenitons of the notion of perfect secrecy; these deenitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these deenitions models the intuitive...

2003
Stuart J.H. Graham

How do firms use secrecy to capture value from inventions? Can a strategic mix of secrecy and patent protections secure for the firm a competitive advantage when commercializing its new technologies? And what role does patent “disclosure” play as a strategic choice in winning for the firm super-normal profits from innovation? Answering these questions is fundamental if we are to understand the ...

2018
Xuanxuan Tang Yueming Cai Wendong Yang Weiwei Yang Dechuan Chen Junquan Hu

In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided ...

2003
Michael Salib

In a society where knowledge is power, the ability to control the distribution of knowledge, what people know and when they know it, becomes the ultimate power. Secrecy is thus a means to an end: the end is controlling other people by controlling what information they have (or do not have). In STS.011, we have read cases illustrating two different ways in which secrecy facilitated control. In s...

2014
Vaibhav Kumar Gupta Poonam Jindal

The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS) techniques. Unfortunately, they can be made less effective if sourceeavesdropper wiretap channel is better than the main sour...

2004
Weiming Zhang Shiqu Li

Different security measurements for a steganographic system, i.e. security (detectability), robustness and secrecy (difficulty of extraction), are discussed in this paper. We propose a new measurement for the security of stegosystems using variational distance which can upper bound the advantage for passive attackers. It is proved that the hiding capacity, which is also the measurement for robu...

2013
Sanjay Vishwakarma A. Chockalingam

In this paper, we consider the achievable sum secrecy rate in full-duplex wiretap channel in the presence of an eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication and the eavesdropper have single antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrec...

Journal: :J. UCS 1996
Helmut Jürgensen Lynda E. Robbins

In the spirit of Shannon's theory of secrecy systems we analyse several possible natural de nitons of the notion of perfect secrecy; these de nitions are based on arguments taken from probability theory, information theory, the theory of computational complexity, and the theory of program-size complexity or algorithmic information. It turns out that none of these de nitions models the intuitive...

2015
Qiuming Liu Li Yu Zuhao Liu Jun Zheng

This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation theory, a set of connected highways and information pipelines is established; while for the secrecy constraint, the concept of secrecy zone is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید