Search Results

There are 5050 results for: content related to: A quantum secure direct communication protocol based on four-qubit cluster state

  1. Eavesdropping on heterospecific alarm calls: from mechanisms to consequences

    Biological Reviews

    Volume 90, Issue 2, May 2015, Pages: 560–586, Robert D. Magrath, Tonya M. Haff, Pamela M. Fallow and Andrew N. Radford

    Version of Record online : 11 JUN 2014, DOI: 10.1111/brv.12122

  2. Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 4, April 2014, Pages: 445–460, Azzam Y. Al-nahari, Ioannis Krikidis, Ahmed S. Ibrahim, Moawad I. Dessouky and Fathi E. Abd El-Samie

    Version of Record online : 7 NOV 2012, DOI: 10.1002/ett.2581

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  5. Leakage-probability-constrained secrecy capacity of a fading channel

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 583–593, Zhi Chen, Dapeng Wu, Pingyi Fan and Khaled Ben Letaief

    Version of Record online : 2 AUG 2011, DOI: 10.1002/sec.353

  6. Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 1028–1036, Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang and Hamid Sharif

    Version of Record online : 8 NOV 2011, DOI: 10.1002/sec.389

  7. You have full text access to this OnlineOpen article
    Relay selection for secrecy connectivity in random wireless networks

    Wireless Communications and Mobile Computing

    Volume 16, Issue 15, 25 October 2016, Pages: 2263–2273, Bai Juan, Xiaofeng Tao, Jin Xu, Xuefei Zhang and Qin Zhang

    Version of Record online : 19 JUL 2016, DOI: 10.1002/wcm.2681

  8. Transfer of Social Learning Across Contexts: Exploring Infants' Attribution of Trait-Like Emotions to Adults

    Infancy

    Volume 21, Issue 6, November–December 2016, Pages: 785–806, Betty M. Repacholi, Andrew N. Meltzoff, Theresa M. Hennings and Ashley L. Ruba

    Version of Record online : 28 FEB 2016, DOI: 10.1111/infa.12136

  9. Counteracting malicious adversaries via secret and reliable coding mechanism in random network coding

    International Journal of Communication Systems

    Volume 26, Issue 5, May 2013, Pages: 567–582, Siguang Chen, Meng Wu and Weifeng Lu

    Version of Record online : 3 NOV 2011, DOI: 10.1002/dac.1359

  10. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    Transactions on Emerging Telecommunications Technologies

    Ahmed H. Abd El-Malek, Anas M. Salhab, Salam A. Zummo and Mohamed-Slim Alouini

    Version of Record online : 18 APR 2017, DOI: 10.1002/ett.3178

  11. Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting

    International Journal of Communication Systems

    Volume 30, Issue 10, 10 July 2017, Pranabesh Maji, Sanjay Dhar Roy and Sumit Kundu

    Version of Record online : 27 OCT 2016, DOI: 10.1002/dac.3228

  12. Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection

    Transactions on Emerging Telecommunications Technologies

    Volume 27, Issue 7, July 2016, Pages: 982–991, Xiaojin Ding, T. Song, Yulong Zou and X. Chen

    Version of Record online : 5 APR 2016, DOI: 10.1002/ett.3040

  13. Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 403–417, Ignacio Sanchez, Gianmarco Baldini, David Shaw and Raimondo Giuliani

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.989

  14. Achievable rate region with secrecy constraints for secure communication in two-way relay networks

    International Journal of Communication Systems

    Volume 28, Issue 2, 25 January 2015, Pages: 231–249, Yunchuan Yang, Wenbo Wang and Hui Zhao

    Version of Record online : 19 SEP 2013, DOI: 10.1002/dac.2663

  15. The role of public information in ecology and conservation: an emphasis on inadvertent social information

    Annals of the New York Academy of Sciences

    Volume 1195, Issue 1, May 2010, Pages: 149–168, Simon Blanchet, Jean Clobert and Étienne Danchin

    Version of Record online : 3 MAY 2010, DOI: 10.1111/j.1749-6632.2010.05477.x

  16. On the secrecy capacity region of 3-user cognitive multiple-access channels with confidential messages

    Transactions on Emerging Telecommunications Technologies

    Amir Sonee and Ghosheh Abed Hodtani

    Version of Record online : 30 MAY 2017, DOI: 10.1002/ett.3197

  17. PRAW—A PRivAcy model for the Web

    Journal of the American Society for Information Science and Technology

    Volume 56, Issue 2, 15 January 2005, Pages: 159–172, Bracha Shapira, Yuval Elovici, Adlay Meshiach and Tsvi Kuflik

    Version of Record online : 5 NOV 2004, DOI: 10.1002/asi.20107

  18. You have free access to this content
    Time-reversal techniques for MISO and MIMO wireless communication systems

    Radio Science

    Volume 47, Issue 6, December 2012, Ahmed E. Fouda, Fernando L. Teixeira and Mehmet E. Yavuz

    Version of Record online : 20 OCT 2012, DOI: 10.1029/2012RS005013

  19. Jamming partner selection for maximising the worst D2D secrecy rate based on social trust

    Transactions on Emerging Telecommunications Technologies

    Volume 28, Issue 2, February 2017, Li Wang and Huaqing Wu

    Version of Record online : 14 OCT 2015, DOI: 10.1002/ett.2992

  20. Effects of Electronic Monitoring Types on Perceptions of Procedural Justice, Interpersonal Justice, and Privacy

    Journal of Applied Social Psychology

    Volume 37, Issue 3, March 2007, Pages: 658–682, Laurel A. McNall and Sylvia G. Roch

    Version of Record online : 7 MAR 2007, DOI: 10.1111/j.1559-1816.2007.00179.x