Found: 592
Select item for more details and to access through your institution.
HawkEar: A bird‐borne visual and acoustic platform for eavesdropping the behaviour of mobile animals.
- Published in:
- Methods in Ecology & Evolution, 2024, v. 15, n. 7, p. 1150, doi. 10.1111/2041-210X.14329
- By:
- Publication type:
- Article
A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 5, p. 3643, doi. 10.1007/s11276-020-02537-3
- By:
- Publication type:
- Article
Security Performance Analysis of Full-Duplex UAV Assisted Relay System Based on SWIPT Technology.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 12, p. 4987, doi. 10.3390/app14124987
- By:
- Publication type:
- Article
Climate Change Threats to Stone Cultural Heritage: State of the Art of Quantitative Damage Functions and New Challenges for a Sustainable Future.
- Published in:
- Heritage (2571-9408), 2024, v. 7, n. 6, p. 3276, doi. 10.3390/heritage7060154
- By:
- Publication type:
- Article
A Hitchhiker's Ride: The Honey Bee Louse Braula Coeca (Diptera: Braulidae) Selects its Host by Eavesdropping.
- Published in:
- Journal of Chemical Ecology, 2024, v. 50, n. 5/6, p. 214, doi. 10.1007/s10886-024-01481-2
- By:
- Publication type:
- Article
Three sympatric host nestlings eavesdrop on cuckoo nestling distress calls.
- Published in:
- Ecology & Evolution (20457758), 2024, v. 14, n. 5, p. 1, doi. 10.1002/ece3.11437
- By:
- Publication type:
- Article
An efficient controlled semi-quantum secret sharing protocol with entangled state.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 5, p. 1, doi. 10.1007/s11082-024-06434-3
- By:
- Publication type:
- Article
Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2024, v. 2024, p. 1, doi. 10.1186/s13634-024-01124-4
- By:
- Publication type:
- Article
Winternitz stack protocols for embedded systems and IoT.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00225-9
- By:
- Publication type:
- Article
Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 1, p. 563, doi. 10.32604/cmc.2024.048922
- By:
- Publication type:
- Article
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN.
- Published in:
- Future Internet, 2024, v. 16, n. 4, p. 143, doi. 10.3390/fi16040143
- By:
- Publication type:
- Article
Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack.
- Published in:
- Modern Physics Letters A, 2024, v. 39, n. 10, p. 1, doi. 10.1142/S0217732324500378
- By:
- Publication type:
- Article
A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 6, p. 2299, doi. 10.3390/app14062299
- By:
- Publication type:
- Article
Blockchain-based secure transaction mechanism for electric vehicles with multiple temporary identities.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 6, p. 4933, doi. 10.1007/s00500-023-09200-x
- By:
- Publication type:
- Article
EAVESDROPPING, THE FOURTH AMENDMENT, AND THE COMMON LAW (OF EAVESDROPPING).
- Published in:
- William & Mary Bill of Rights Journal, 2024, v. 32, n. 3, p. 721
- By:
- Publication type:
- Article
Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs.
- Published in:
- Journal of Marine Science & Engineering, 2024, v. 12, n. 2, p. 314, doi. 10.3390/jmse12020314
- By:
- Publication type:
- Article
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 2, p. 1, doi. 10.1007/s11128-023-04255-z
- By:
- Publication type:
- Article
Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 3, p. 850, doi. 10.3390/s24030850
- By:
- Publication type:
- Article
Quantum Privacy Query Protocol Based on GHZ-like States.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 2, p. 608, doi. 10.3390/app14020608
- By:
- Publication type:
- Article
IRS Backscatter-Based Secrecy Enhancement against Active Eavesdropping.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 2, p. 265, doi. 10.3390/electronics13020265
- By:
- Publication type:
- Article
Timed-release encryption anonymous interaction protocol based on smart contract.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-023-00536-1
- By:
- Publication type:
- Article
IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 138, n. 1, p. 885, doi. 10.32604/cmes.2023.029234
- By:
- Publication type:
- Article
Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping.
- Published in:
- Entropy, 2024, v. 26, n. 1, p. 64, doi. 10.3390/e26010064
- By:
- Publication type:
- Article
Estimation of mean photon number based on single photon detection of weak coherent pulses.
- Published in:
- Iraqi Journal of Laser, 2024, v. 23, n. 1, p. 99, doi. 10.31900/ijl.v23i1.455
- By:
- Publication type:
- Article
Eavesdropping: The Forgotten Public Nuisance in the Age of Alexa.
- Published in:
- Vanderbilt Law Review, 2024, v. 77, n. 1, p. 169
- By:
- Publication type:
- Article
Secure Control of Linear Controllers Using Fully Homomorphic Encryption.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 24, p. 13071, doi. 10.3390/app132413071
- By:
- Publication type:
- Article
Special Economic Zones in India: Location and Land Utilisation.
- Published in:
- Artha Vijnana, 2023, v. 65, n. 4, p. 374
- By:
- Publication type:
- Article
A Numerical Study on the Capacity Region of a Three-Layer Wiretap Network.
- Published in:
- Entropy, 2023, v. 25, n. 12, p. 1566, doi. 10.3390/e25121566
- By:
- Publication type:
- Article
Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.
- Published in:
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 6, p. 1127, doi. 10.18280/ijsse.130616
- By:
- Publication type:
- Article
Twin-field quantum encryption protocol for E-payment based on blockchain.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 12, p. 1, doi. 10.1007/s11128-023-04181-0
- By:
- Publication type:
- Article
Active eavesdropping detection: a novel physical layer security in wireless IoT.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13634-023-01080-5
- By:
- Publication type:
- Article
Secrecy of WSN Data Over Nakagami-m Fading Channels with Selection Combining Diversity.
- Published in:
- Defence Science Journal, 2023, v. 73, n. 6, p. 722, doi. 10.14429/dsj.73.18804
- By:
- Publication type:
- Article
RIS-Assisted Robust Beamforming for UAV Anti-Jamming and Eavesdropping Communications: A Deep Reinforcement Learning Approach.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4490, doi. 10.3390/electronics12214490
- By:
- Publication type:
- Article
Efficient Quantum Private Comparison without Sharing a Key.
- Published in:
- Entropy, 2023, v. 25, n. 11, p. 1552, doi. 10.3390/e25111552
- By:
- Publication type:
- Article
DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight.
- Published in:
- KSII Transactions on Internet & Information Systems, 2023, v. 17, n. 11, p. 3163, doi. 10.3837/tiis.2023.11.014
- By:
- Publication type:
- Article
"Wire with something in it from men to men": Robert Frost, the Rural Telephone Network, and the Poetics of Eavesdropping.
- Published in:
- Modernism/Modernity, 2023, v. 30, n. 4, p. 767, doi. 10.1353/mod.2023.a925907
- By:
- Publication type:
- Article
Cultural Resilience and Syncretism: The Towani Tolotang Community's Journey in Indonesia's Religious Landscape.
- Published in:
- Journal of Ethnic & Cultural Studies, 2023, v. 10, n. 4, p. 233, doi. 10.29333/ejecs/1863
- By:
- Publication type:
- Article
Scheduling in Wireless Cooperative Localization Networks with Intelligent Eavesdroppers.
- Published in:
- Wireless Communications & Mobile Computing, 2023, p. 1, doi. 10.1155/2023/7533455
- By:
- Publication type:
- Article
Quantum authentication method based on key-controlled maximally mixed quantum state encryption.
- Published in:
- EPJ Quantum Technology, 2023, v. 10, n. 1, p. 1, doi. 10.1140/epjqt/s40507-023-00193-y
- By:
- Publication type:
- Article
Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless Systems.
- Published in:
- Wireless Communications & Mobile Computing, 2023, p. 1, doi. 10.1155/2023/3178335
- By:
- Publication type:
- Article
Climate, AI & Quantum: Europe's Regulatory Horizon.
- Published in:
- European Journal of Risk Regulation, 2023, v. 14, n. 3, p. 429, doi. 10.1017/err.2023.74
- By:
- Publication type:
- Article
Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 17, p. 7653, doi. 10.3390/s23177653
- By:
- Publication type:
- Article
KATZ IN THE DIGITAL AGE: WHY THE KATZ SUBJECTIVE PRONG MUST BE RESTRENGTHENED.
- Published in:
- Southwestern Law Review, 2023, v. 52, n. 1, p. 174
- By:
- Publication type:
- Article
Transmitter selection for secrecy against colluding eavesdroppers with backhaul uncertainty.
- Published in:
- IET Communications (Wiley-Blackwell), 2023, v. 17, n. 14, p. 1741, doi. 10.1049/cmu2.12650
- By:
- Publication type:
- Article
Laser‐Induced Graphene Hologram Reconfiguration for Countersurveillance Multisecret Sharing.
- Published in:
- Laser & Photonics Reviews, 2023, v. 17, n. 8, p. 1, doi. 10.1002/lpor.202200805
- By:
- Publication type:
- Article
非理想信道状态信息下 RIS 辅助的安全通信.
- Published in:
- Telecommunication Engineering, 2023, v. 63, n. 7, p. 1017, doi. 10.20079/j.issn.1001-893x.220224002
- By:
- Publication type:
- Article
Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2023, v. 136, n. 1, p. 531, doi. 10.32604/cmes.2023.024531
- By:
- Publication type:
- Article
The evolution of eavesdropping on heterospecific alarm calls: Relevance, reliability, and personal information.
- Published in:
- Ecology & Evolution (20457758), 2023, v. 13, n. 7, p. 1, doi. 10.1002/ece3.10272
- By:
- Publication type:
- Article
LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network.
- Published in:
- Entropy, 2023, v. 25, n. 7, p. 966, doi. 10.3390/e25070966
- By:
- Publication type:
- Article
High Dimensional Quantum Digital Signature Depending on Entanglement Swapping.
- Published in:
- International Journal of Information Security Science, 2023, v. 12, n. 3, p. 14, doi. 10.55859/ijiss.1294840
- By:
- Publication type:
- Article