نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

2018
Ben Smyth

We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition builds upon and strengthens earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose definitions of ballot independence as adaptations of nonmalleability and indistinguishability gam...

2003
Phillip G. Bradford Olga V. Gavrylyako Randy K. Smith

In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...

2009
S. Anand

Abstract We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-terminal networks with power control. We determine the logical location of an eavesdropper (represented by the channel gain from all the transmitters) which a) results in zero secrecy capacity for maximum number of users in the network and b) results in zero secrecy capacity for the bottle-nec...

2004
Stuart J.H. Graham

This paper examines firms’ uses of secrecy and patenting in order to explore three elementary questions of firm intellectual property strategy: First, are there complementarities between patenting and secrecy that firms exploit when crafting their technology market strategies? Second, what drives the firm’s choice of a patent-secret mix when developing a strategy to sustain to itself competitiv...

2009
S. Anand

We consider power control in multi-terminal networks and study its impact on secrecy capacities of transmitreceive pairs. Note that most approaches in the current literature on secrecy capacity consider only single terminals. Impact of power control on secrecy capacity has seldom been studied. This paper investigates a new approach using the theory of M−matrices to utility based power control w...

Journal: :Journal of adolescence 2013
Robert D Laird Brittanee J Bridges Monica A Marsee

Keeping secrets from parents is associated with depression and antisocial behavior. The current study tested whether keeping secrets from best friends is similarly linked to maladjustment, and whether associations between secrecy and maladjustment are moderated by the quality of the friendship. Adolescents (N = 181; 51% female, 48% white, non-Hispanic, 45% African American) reported their secre...

Journal: :African journal of AIDS research : AJAR 2003
Graeme Reid Liz Walker

This paper situates the articles selected for this special issue of AJAR within the context of the Sex and Secrecy conference, from which they emerged and within the discourse of secrecy. Secrecy and silence which have characterised the HIV/AIDS epidemic in many societies, have been the focus of limited academic attention. Yet the power of the secret is evident in multiple spheres. This introdu...

2016
Kyusung Shim Nhu Tri Do Beongku An

In this paper, we study physical layer security (PLS) of wireless networks in presence of one eavesdropper. Assume that the channel state information (CSI) of the eavesdropper cannot be obtained at the transmitter, such as CSI can be then estimated through the CSI of a torch node. In addition, a practical issue of wireless nodes, i.e., hardware impairment (HI), is considered at the source node ...

Journal: :Irish medical journal 2013
Skyler T Hawk Loes Keijsers Tom Frijns William W Hale Susan Branje Wim Meeus

This 3-year, multi-informant study examined whether youths' perceptions of parental privacy invasion predicted lower parental knowledge over time, as a function of increased adolescent secrecy. Participants were 497 Dutch adolescents (Time 1 M = 13 years, SD = 0.5; 57% boys) and both parents. Higher youth-reported invasion predicted lower father- and mother-reported knowledge 1 year later. A li...

2012
Sven Wenzel Daniel Warzecha

The composition of processes is in general not secrecy pre-serving under the Dolev-Yao attacker model. In this paper, we describean algorithmic decision procedure which determines whether the com-position of secrecy preserving processes is still secrecy preserving. As acase-study we consider a variant of the TLS protocol where, even thoughthe client and server considered sep...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید