-
21
Enhanced zebra optimization algorithm and applications of power allocation in SDWN
Published 2025-01-01Subjects: Get full text
Article -
22
Security model for ID-based key exchange
Published 2010-01-01Subjects: “…key generation center forward secrecy…”
Get full text
Article -
23
Secrecy Rate Performance Analysis of Jammer-Aided Symbiotic Radio with Sensing Errors for Fifth Generation Wireless Networks
Published 2024-12-01Subjects: Get full text
Article -
24
Chosen Aspects of Psychiatric Confidentiality in the Jurisprudence of the Supreme Court
Published 2024-11-01Subjects: Get full text
Article -
25
Temporary Access to Documents Containing Medical Secrecy (Criminal Procedural Aspect)
Published 2020-02-01Subjects: “…medical secrecy…”
Get full text
Article -
26
Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network
Published 2019-05-01Subjects: Get full text
Article -
27
The ways of protecting the medical confidentiality
Published 2019-02-01Subjects: Get full text
Article -
28
Secure D2D underlaying cellular communication based on artificial noise assisted
Published 2015-10-01Subjects: Get full text
Article -
29
Performance Analysis of Artificial-Noise-Based Secure Transmission in Wiretap Channel
Published 2024-12-01Subjects: Get full text
Article -
30
Performance analysis and power optimization for FH secure communication under frequency and phase mismatch
Published 2022-09-01Subjects: Get full text
Article -
31
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
Published 2009-01-01Subjects: Get full text
Article -
32
Archives numériques aborigènes, parenté et création
Published 2022-03-01Subjects: Get full text
Article -
33
Cooperative interference power allocation in physical layer security under imperfect time synchronization
Published 2019-11-01Subjects: Get full text
Article -
34
A hybrid cooperative jamming protocol for full-duplex relay wiretap system
Published 2017-01-01Subjects: Get full text
Article -
35
Physical layer security of modify-and-forward cooperative D2D networks based on transmit antenna selection
Published 2024-04-01Subjects: Get full text
Article -
36
Secrecy, Suspicion, Exposure: Negotiating Authority Structures in a Settler Colonial Society as Depicted in Walter Van Tilburg Clark’s The Ox-Bow Incident
Published 2021-01-01Subjects: “…secrecy…”
Get full text
Article -
37
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
Published 2018-09-01Subjects: Get full text
Article -
38
Antenna selection algorithm based on cut-off rate for secure spatial modulation with finite alphabet input
Published 2020-03-01Subjects: Get full text
Article -
39
Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN
Published 2022-03-01Subjects: Get full text
Article -
40
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
Published 2016-08-01Subjects: Get full text
Article