Academic literature on the topic 'Secrecy efficiency'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secrecy efficiency.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secrecy efficiency"
Courpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.
Full textLeino, Päivi. "Secrecy, Efficiency, Transparency in EU Negotiations: Conflicting Paradigms?" Politics and Governance 5, no. 3 (2017): 6–15. http://dx.doi.org/10.17645/pag.v5i3.985.
Full textQIAN, Yewang, Tingting ZHANG, and Haiyang ZHANG. "Secrecy Energy Efficiency Optimization for MIMO SWIPT Systems." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 7 (2018): 1141–45. http://dx.doi.org/10.1587/transfun.e101.a.1141.
Full textZhou, Xiaobo, Wenlong Cai, Riqing Chen, et al. "Secrecy energy efficiency optimization for MISO SWIPT systems." Physical Communication 28 (June 2018): 19–27. http://dx.doi.org/10.1016/j.phycom.2018.03.001.
Full textOuyang, Jian, Min Lin, Yulong Zou, Wei-Ping Zhu, and Daniel Massicotte. "Secrecy Energy Efficiency Maximization in Cognitive Radio Networks." IEEE Access 5 (2017): 2641–50. http://dx.doi.org/10.1109/access.2017.2667882.
Full textYin, Liuguo, Chuanao Jiang, Chunxiao Jiang, Ning Ge, Linling Kuang, and Mohsen Guizani. "A Communication Framework with Unified Efficiency and Secrecy." IEEE Wireless Communications 26, no. 4 (2019): 133–39. http://dx.doi.org/10.1109/mwc.2019.1800361.
Full textOliveira, Guilherme, Evelio Fernández, Samuel Mafra, Samuel Montejo-Sánchez, and César Azurdia-Meza. "Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks." Security and Communication Networks 2018 (December 25, 2018): 1–13. http://dx.doi.org/10.1155/2018/9065856.
Full textDuo, Bin, Qingqing Wu, Xiaojun Yuan, and Rui Zhang. "Energy Efficiency Maximization for Full-Duplex UAV Secrecy Communication." IEEE Transactions on Vehicular Technology 69, no. 4 (2020): 4590–95. http://dx.doi.org/10.1109/tvt.2020.2977948.
Full textTa, Hien Q., and Sang Wu Kim. "Adapting Rate and Power for Maximizing Secrecy Energy Efficiency." IEEE Communications Letters 21, no. 9 (2017): 2049–52. http://dx.doi.org/10.1109/lcomm.2017.2709738.
Full textXiao, Lin, Yu Xu, Dingcheng Yang, and Yong Zeng. "Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying." IEEE Transactions on Green Communications and Networking 4, no. 1 (2020): 180–93. http://dx.doi.org/10.1109/tgcn.2019.2949802.
Full textDissertations / Theses on the topic "Secrecy efficiency"
Alotaibi, Nafel Nahes A. "Improving secrecy and spectral efficiency of wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html.
Full textBarceló, Lladó Joan Enric. "Communications in Wireless Sensor Networks: Compression, Energy Efficiency and Secrecy." Doctoral thesis, Universitat Autònoma de Barcelona, 2012. http://hdl.handle.net/10803/97359.
Full textTanga, Vikas Reddy. "The Chief Security Officer Problem." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404557/.
Full textPolisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.
Full textVasudevan, Prashant Nalini. "A study of efficient secret sharing." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101590.
Full textChoudary, Omar-Salim. "Efficient multivariate statistical techniques for extracting secrets from electronic devices." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708342.
Full textLüdtke, Susann [Verfasser]. "The Secret of Lobbying in China : Who Influences Building Energy Efficiency Standards? / Susann Lüdtke." Baden-Baden : Nomos Verlagsgesellschaft mbH & Co. KG, 2020. http://d-nb.info/1212393503/34.
Full textAbdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.
Full textPotay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.
Full textOsorio, Carlos Ivan Henao. "Robustness against noise and efficiency of two-way quantum key distribution protocols." reponame:Repositório Institucional da UFABC, 2014.
Find full textBooks on the topic "Secrecy efficiency"
Scheppele, Kim Lane. Legal secrets: Equality and efficiency in the common law. University of Chicago Press, 1988.
Find full textRufo, Mike. California's secret energy surplus: The potential for energy efficiency. The Energy Foundation and The Hewlett Foundation, 2002.
Find full textFink, Don. Be iron fit: Time-efficient training secrets for ultimate fitness. 2nd ed. Lyons Press, 2010.
Find full textInc, NetLibrary, ed. The 80/20 principle: The secret of achieving more with less. Nicholas Brealey Pub., 2000.
Find full textAssociation, Medical Group Management, ed. The new healthcare supervisor's guide: The secrets to success. Medical Group Management Association, 2010.
Find full textMastering the marathon: Time-efficient training secrets for the 40-plus athlete. Lyons Press, 2010.
Find full textKoch, Richard. The 80/20 principle: The secret of achieving more with less. Nicholas Brealey, 1997.
Find full textRichard, Koch. The 80/20 principle: The secret of achieving more with less. Currency, 1998.
Find full textThe 80/20 principle: The secret of achieving more with less. 2nd ed. Nicholas Brealey Pub., 2007.
Find full textBook chapters on the topic "Secrecy efficiency"
Hua, Meng, Chunguo Li, and Luxi Yang. "Secrecy Energy Efficiency Maximization for UAV-Aided Communication Systems." In Intelligent Robotics and Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27538-9_4.
Full textAronoff, Janee, David Cross, Gavin Cromhout, and Colin Smith. "Efficiency." In Photoshop 7 Trade Secrets. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5220-7_2.
Full textLv, Chunli, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, and Mingli Sun. "Efficient Secret Sharing Schemes." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22339-6_14.
Full textBlundo, Carlo, Alfredo Santis, and Ugo Vaccaro. "Efficient sharing of many secrets." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-56503-5_68.
Full textSmolka, Tobiáš, Petr Švenda, Lukáš Sekanina, and Vashek Matyáš. "Evolutionary Design of Message Efficient Secrecy Amplification Protocols." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29139-5_17.
Full textApplebaum, Benny, Yuval Ishai, and Eyal Kushilevitz. "From Secrecy to Soundness: Efficient Verification via Secure Computation." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14165-2_14.
Full textHeiner, Monika, Christian Rohr, Martin Schwarick, and Alexey A. Tovchigrechko. "MARCIE’s Secrets of Efficient Model Checking." In Transactions on Petri Nets and Other Models of Concurrency XI. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53401-4_14.
Full textJin, Byoungho Ellie, Elena Cedrola, and Naeun Kim. "Process Innovation: Hidden Secret to Success and Efficiency." In Palgrave Studies in Practice: Global Fashion Brand Management. Palgrave Macmillan US, 2019. http://dx.doi.org/10.1057/978-1-137-52352-5_1.
Full textDobre, Dan, Matthias Majuntke, Marco Serafini, and Neeraj Suri. "Efficient Robust Storage Using Secret Tokens." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05118-0_19.
Full textMurtaza, Abid, Syed Jahanzeb Hussain Pirzada, Muhammad Noman Hasan, Tongge Xu, and Liu Jianwei. "An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0_21.
Full textConference papers on the topic "Secrecy efficiency"
Zappone, Alessio, Pin-Hsun Lin, and Eduard A. Jorswieck. "Secrecy and energy efficiency in MIMO-ME systems." In 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2015. http://dx.doi.org/10.1109/spawc.2015.7227064.
Full textYao, Rugui, Lukun Yao, Xiaoya Zuo, Nan Qi, Yinsheng Liu, and Juan Xu. "Secrecy Energy Efficiency Maximization in a NOMA System." In 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN). IEEE, 2019. http://dx.doi.org/10.1109/iccsn.2019.8905336.
Full textOzmen, Mustafa, and M. Cenk Gursoy. "Throughput and energy efficiency under queueing and secrecy constraints." In 2012 46th Asilomar Conference on Signals, Systems and Computers. IEEE, 2012. http://dx.doi.org/10.1109/acssc.2012.6488959.
Full textJi, Zhengxia, Mengyun Nie, Lingquan Meng, Qingran Wang, Chunguo Li, and Kang Song. "On Secrecy Energy Efficiency of RF Energy Harvesting System." In 2019 IEEE International Workshop on Signal Processing Systems (SiPS). IEEE, 2019. http://dx.doi.org/10.1109/sips47522.2019.9020408.
Full textKalantari, Ashkan, Sina Maleki, Symeon Chatzinotas, and Bjorn Ottersten. "Secrecy energy efficiency optimization for MISO and SISO communication networks." In 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2015. http://dx.doi.org/10.1109/spawc.2015.7226992.
Full textLi, Mu, Yuzhen Huang, Mianquan Li, et al. "Secrecy and Efficiency in Overlay Cognitive Full-duplex Wireless Networks." In 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT). IEEE, 2019. http://dx.doi.org/10.1109/iceict.2019.8846339.
Full textWen, Yingkun, Tao Jing, Yan Huo, Zhen Li, and Qinghe Gao. "Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390398.
Full textOzmen, Mustafa, Chuang Ye, M. Cenk Gursoy, and Senem Velipasalar. "Energy efficiency in fading relay channels under secrecy and QoS constraints." In 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, 2014. http://dx.doi.org/10.1109/pimrc.2014.7136150.
Full textFangbiao Li, Xiao Chen, Zhi Xue, Jie Gu, and Yan Zhu. "An alternative proof for the secrecy capacity region of the Gaussian wiretap channel." In Symposium on ICT and Energy Efficiency and Workshop on Information Theory and Security (CIICT 2012). Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1865.
Full textLin, Yan, Gang Wang, Chao Meng, Wei Heng, and Xiaoshu Chen. "Secrecy Energy Efficiency Optimization in AN-Aided MISO System with Energy Harvesting." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422301.
Full text