Academic literature on the topic 'Secrecy efficiency'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secrecy efficiency.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secrecy efficiency"

1

Courpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.

Full text
Abstract:
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstanc
APA, Harvard, Vancouver, ISO, and other styles
2

Leino, Päivi. "Secrecy, Efficiency, Transparency in EU Negotiations: Conflicting Paradigms?" Politics and Governance 5, no. 3 (2017): 6–15. http://dx.doi.org/10.17645/pag.v5i3.985.

Full text
Abstract:
This contribution considers how the values of transparency and efficiency are realised in the context of “EU negotiations” both in the internal and the external sphere. Legislating comes with a presumption of openness in the EU, while international negotiations have traditionally been assumed to require secrecy. However, irrespective of the basic paradigms, the institutions often appear to follow a rather simple rationale that secrecy makes better decisions, both in internal and external affairs. Similar efficiency concerns seem to relate to protecting the procedure of decision-making from ext
APA, Harvard, Vancouver, ISO, and other styles
3

QIAN, Yewang, Tingting ZHANG, and Haiyang ZHANG. "Secrecy Energy Efficiency Optimization for MIMO SWIPT Systems." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 7 (2018): 1141–45. http://dx.doi.org/10.1587/transfun.e101.a.1141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Xiaobo, Wenlong Cai, Riqing Chen, et al. "Secrecy energy efficiency optimization for MISO SWIPT systems." Physical Communication 28 (June 2018): 19–27. http://dx.doi.org/10.1016/j.phycom.2018.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ouyang, Jian, Min Lin, Yulong Zou, Wei-Ping Zhu, and Daniel Massicotte. "Secrecy Energy Efficiency Maximization in Cognitive Radio Networks." IEEE Access 5 (2017): 2641–50. http://dx.doi.org/10.1109/access.2017.2667882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yin, Liuguo, Chuanao Jiang, Chunxiao Jiang, Ning Ge, Linling Kuang, and Mohsen Guizani. "A Communication Framework with Unified Efficiency and Secrecy." IEEE Wireless Communications 26, no. 4 (2019): 133–39. http://dx.doi.org/10.1109/mwc.2019.1800361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Guilherme, Evelio Fernández, Samuel Mafra, Samuel Montejo-Sánchez, and César Azurdia-Meza. "Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks." Security and Communication Networks 2018 (December 25, 2018): 1–13. http://dx.doi.org/10.1155/2018/9065856.

Full text
Abstract:
The next generations of wireless communications are expected to have great demand for security and spectrum efficiency, and the current secrecy solutions may not be enough. In this paper we propose an optimization framework to address the physical layer security in cognitive radio networks when the secondary users employ improper Gaussian signaling. We resort to genetic algorithms to find optimal values of the secondary transmit power and the degree of impropriety, simultaneously. Then, two different problems regarding the system performance are solved: minimizing the secrecy outage probabilit
APA, Harvard, Vancouver, ISO, and other styles
8

Duo, Bin, Qingqing Wu, Xiaojun Yuan, and Rui Zhang. "Energy Efficiency Maximization for Full-Duplex UAV Secrecy Communication." IEEE Transactions on Vehicular Technology 69, no. 4 (2020): 4590–95. http://dx.doi.org/10.1109/tvt.2020.2977948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ta, Hien Q., and Sang Wu Kim. "Adapting Rate and Power for Maximizing Secrecy Energy Efficiency." IEEE Communications Letters 21, no. 9 (2017): 2049–52. http://dx.doi.org/10.1109/lcomm.2017.2709738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiao, Lin, Yu Xu, Dingcheng Yang, and Yong Zeng. "Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying." IEEE Transactions on Green Communications and Networking 4, no. 1 (2020): 180–93. http://dx.doi.org/10.1109/tgcn.2019.2949802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secrecy efficiency"

1

Alotaibi, Nafel Nahes A. "Improving secrecy and spectral efficiency of wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html.

Full text
Abstract:
The current and future demand for wireless technology is increasing rapidlyin the era of Internet-of-things, information-shower, auto-drive vehicles andthe fifth generation of mobile communications. The flourishing in wirelesstechnologies comes from their advantages such as mobility, flexibility, easy toextend, easy to install and easy to do the maintenance. However, the wirelesstechnology is suffering from many problems such as; lack of security andthe shortage of spectrum bands. The security remains a major challenge forthe wireless communications because of the broadcasting nature of wirele
APA, Harvard, Vancouver, ISO, and other styles
2

Barceló, Lladó Joan Enric. "Communications in Wireless Sensor Networks: Compression, Energy Efficiency and Secrecy." Doctoral thesis, Universitat Autònoma de Barcelona, 2012. http://hdl.handle.net/10803/97359.

Full text
Abstract:
Les xarxes de sensors sense fils (WSNs) han esdevingut un dels sistemes de comunicació amb més projecció d'aquesta dècada. Abasten una àmplia varietat d’aplicacions tals com la monitorització del medi ambient, la predicció de desastres naturals, en medicina, en transport, posicionament en interiors, i tasques militars. Els nodes que composen la xarxa, són típicament de baix cost, cosa que atorga una sèrie de limitacions en termes d’energia, velocitat de càlcul i d’ample de banda. Amb els avenços de les comunicacions sense fils i la creixent demanda de noves i més complexes aplicacions, les WSN
APA, Harvard, Vancouver, ISO, and other styles
3

Tanga, Vikas Reddy. "The Chief Security Officer Problem." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404557/.

Full text
Abstract:
The Chief Security Officer Problem (CSO) consists of a CSO, a group of agents trying to communicate with the CSO and a group of eavesdroppers trying to listen to the conversations between the CSO and its agents. Through Lemmas and Theorems, several Information Theoretic questions are answered.
APA, Harvard, Vancouver, ISO, and other styles
4

Polisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.

Full text
Abstract:
This paper is persuaded to understand the physical layer security in wireless commu-nications utilizing NOMA (Non Orthogonal Multiple Access) concepts in the presence of an eavesdropper. Physical layer security maintains the confidentiality and secrecyof the system against eavesdroppers. We use the power domain in this paper, where NOMA allows many users to share resources side by side. Power allocation concern-ing channel condition is taken into consideration where user whose channel condition is weak is allocated with eminent power to directly decode the signal, whereas theuser with better c
APA, Harvard, Vancouver, ISO, and other styles
5

Vasudevan, Prashant Nalini. "A study of efficient secret sharing." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101590.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 49-52).<br>We show a general connection between various types of statistical zero-knowledge (SZK) proof systems and (unconditionally secure) secret sharing schemes. Viewed through the SZK lens, we obtain several new results on secret-sharing: " Characterizations: We obtain an almost-characterization of access structures for which there are secret-sharing schemes with an efficient sharing algo
APA, Harvard, Vancouver, ISO, and other styles
6

Choudary, Omar-Salim. "Efficient multivariate statistical techniques for extracting secrets from electronic devices." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lüdtke, Susann [Verfasser]. "The Secret of Lobbying in China : Who Influences Building Energy Efficiency Standards? / Susann Lüdtke." Baden-Baden : Nomos Verlagsgesellschaft mbH & Co. KG, 2020. http://d-nb.info/1212393503/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.

Full text
Abstract:
The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve transmission of a variety of complex data and multimedia objects. Securing the content of sensitive as well as personal transactions over open networks while ensuring the privacy of information has become essential but increasingly challenging. Therefore, information and multimedia security research area attracts more and more interest, and its scope of application
APA, Harvard, Vancouver, ISO, and other styles
9

Potay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.

Full text
Abstract:
Secret Sharing refers to a method through which a secret key K can be shared among a group of authorized participants, such that when they come together later, they can figure out the secret key K to decrypt the encrypted message. Any group which is not authorized cannot determine the secret key K. Some of the important secret schemes are Shamir Threshold Scheme, Monotone Circuit Scheme, and Brickell Vector Space Scheme. Brikell’s vector space secret sharing construction requires the existence of a function from a set of participant P in to vector space Zdp, where p is a prime number and d is
APA, Harvard, Vancouver, ISO, and other styles
10

Osorio, Carlos Ivan Henao. "Robustness against noise and efficiency of two-way quantum key distribution protocols." reponame:Repositório Institucional da UFABC, 2014.

Find full text
Abstract:
Orientador: Prof. Dr Carlos Ivan Henao Osorio<br>Dissertação (mestrado) - Universidade Federal do ABC, Programa de Pós-Graduação em Física, 2014.<br>Neste trabalho, apresentamos novos resultados sobre segurança de protocolos de distribuição quântica de chave de duas vías (TWQKD por suas iniciáis em inglês) que utilizam estados não ortogonáis. Trabalhamos no cenário de protocolos para os quais o pós-processamento é feito com comunicação clássica de uma via e não há pre-processamento. O análise de segurança é implementado com tecnicas que permitem cubrir conjuntos de protocolos bastante amplos.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secrecy efficiency"

1

Scheppele, Kim Lane. Legal secrets: Equality and efficiency in the common law. University of Chicago Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rufo, Mike. California's secret energy surplus: The potential for energy efficiency. The Energy Foundation and The Hewlett Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fink, Don. Be iron fit: Time-efficient training secrets for ultimate fitness. 2nd ed. Lyons Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Inc, NetLibrary, ed. The 80/20 principle: The secret of achieving more with less. Nicholas Brealey Pub., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Association, Medical Group Management, ed. The new healthcare supervisor's guide: The secrets to success. Medical Group Management Association, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mastering the marathon: Time-efficient training secrets for the 40-plus athlete. Lyons Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koch, Richard. The 80/20 principle: The secret of achieving more with less. Nicholas Brealey, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The 80/20 principle: The secret of achieving more with less. Doubleday, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Richard, Koch. The 80/20 principle: The secret of achieving more with less. Currency, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The 80/20 principle: The secret of achieving more with less. 2nd ed. Nicholas Brealey Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secrecy efficiency"

1

Hua, Meng, Chunguo Li, and Luxi Yang. "Secrecy Energy Efficiency Maximization for UAV-Aided Communication Systems." In Intelligent Robotics and Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27538-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aronoff, Janee, David Cross, Gavin Cromhout, and Colin Smith. "Efficiency." In Photoshop 7 Trade Secrets. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5220-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lv, Chunli, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, and Mingli Sun. "Efficient Secret Sharing Schemes." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22339-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blundo, Carlo, Alfredo Santis, and Ugo Vaccaro. "Efficient sharing of many secrets." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-56503-5_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smolka, Tobiáš, Petr Švenda, Lukáš Sekanina, and Vashek Matyáš. "Evolutionary Design of Message Efficient Secrecy Amplification Protocols." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29139-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Applebaum, Benny, Yuval Ishai, and Eyal Kushilevitz. "From Secrecy to Soundness: Efficient Verification via Secure Computation." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14165-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heiner, Monika, Christian Rohr, Martin Schwarick, and Alexey A. Tovchigrechko. "MARCIE’s Secrets of Efficient Model Checking." In Transactions on Petri Nets and Other Models of Concurrency XI. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53401-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Byoungho Ellie, Elena Cedrola, and Naeun Kim. "Process Innovation: Hidden Secret to Success and Efficiency." In Palgrave Studies in Practice: Global Fashion Brand Management. Palgrave Macmillan US, 2019. http://dx.doi.org/10.1057/978-1-137-52352-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dobre, Dan, Matthias Majuntke, Marco Serafini, and Neeraj Suri. "Efficient Robust Storage Using Secret Tokens." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05118-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Murtaza, Abid, Syed Jahanzeb Hussain Pirzada, Muhammad Noman Hasan, Tongge Xu, and Liu Jianwei. "An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secrecy efficiency"

1

Zappone, Alessio, Pin-Hsun Lin, and Eduard A. Jorswieck. "Secrecy and energy efficiency in MIMO-ME systems." In 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2015. http://dx.doi.org/10.1109/spawc.2015.7227064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yao, Rugui, Lukun Yao, Xiaoya Zuo, Nan Qi, Yinsheng Liu, and Juan Xu. "Secrecy Energy Efficiency Maximization in a NOMA System." In 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN). IEEE, 2019. http://dx.doi.org/10.1109/iccsn.2019.8905336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ozmen, Mustafa, and M. Cenk Gursoy. "Throughput and energy efficiency under queueing and secrecy constraints." In 2012 46th Asilomar Conference on Signals, Systems and Computers. IEEE, 2012. http://dx.doi.org/10.1109/acssc.2012.6488959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ji, Zhengxia, Mengyun Nie, Lingquan Meng, Qingran Wang, Chunguo Li, and Kang Song. "On Secrecy Energy Efficiency of RF Energy Harvesting System." In 2019 IEEE International Workshop on Signal Processing Systems (SiPS). IEEE, 2019. http://dx.doi.org/10.1109/sips47522.2019.9020408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalantari, Ashkan, Sina Maleki, Symeon Chatzinotas, and Bjorn Ottersten. "Secrecy energy efficiency optimization for MISO and SISO communication networks." In 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2015. http://dx.doi.org/10.1109/spawc.2015.7226992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Mu, Yuzhen Huang, Mianquan Li, et al. "Secrecy and Efficiency in Overlay Cognitive Full-duplex Wireless Networks." In 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT). IEEE, 2019. http://dx.doi.org/10.1109/iceict.2019.8846339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wen, Yingkun, Tao Jing, Yan Huo, Zhen Li, and Qinghe Gao. "Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Networks." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ozmen, Mustafa, Chuang Ye, M. Cenk Gursoy, and Senem Velipasalar. "Energy efficiency in fading relay channels under secrecy and QoS constraints." In 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, 2014. http://dx.doi.org/10.1109/pimrc.2014.7136150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fangbiao Li, Xiao Chen, Zhi Xue, Jie Gu, and Yan Zhu. "An alternative proof for the secrecy capacity region of the Gaussian wiretap channel." In Symposium on ICT and Energy Efficiency and Workshop on Information Theory and Security (CIICT 2012). Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Yan, Gang Wang, Chao Meng, Wei Heng, and Xiaoshu Chen. "Secrecy Energy Efficiency Optimization in AN-Aided MISO System with Energy Harvesting." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!