Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Eavesdropping")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 385

  • Page / 16
Export

Selection :

  • and

Security of information in IT systemsKALICZYNSKA, Malgorzata.SPIE proceedings series. 2005, pp 571-576, isbn 0-8194-5756-6, 6 p.Conference Paper

An Air Transfer Experiment Confirms the Role of Volatile Cues in Communication between PlantsKARBAN, Richard; SHIOJIRI, Kaori; ISHIZAKI, Satomi et al.The American naturalist. 2010, Vol 176, Num 3, pp 381-384, issn 0003-0147, 4 p.Article

Emission Security Limits for Compromising Emanations Using Electromagnetic Emanation Security Channel AnalysisLEE, Hee-Kyung; KIM, Yong-Hwa; KIM, Young-Hoon et al.IEICE transactions on communications. 2013, Vol 96, Num 10, pp 2639-2649, issn 0916-8516, 11 p.Article

Interference Assisted Secret CommunicationXIAOJUN TANG; RUOHENG LIU; SPASOJEVIC, Predrag et al.IEEE transactions on information theory. 2011, Vol 57, Num 5, pp 3153-3167, issn 0018-9448, 15 p.Article

Secure Coding Over Networks Against Noncooperative EavesdroppingJIN XU; BIAO CHEN.IEEE transactions on information theory. 2013, Vol 59, Num 7, pp 4498-4509, issn 0018-9448, 12 p.Article

On the (un)reliability of eavesdropping : Network forensicsCRONIN, Eric; SHERR, Micah; BLAZE, Matt et al.International journal of security and networks (Print). 2008, Vol 3, Num 2, pp 103-113, issn 1747-8405, 11 p.Conference Paper

Bipartite coherent-state quantum key distribution with strong reference pulseMISHRA, Manoj K; PRAKASH, Hari.Quantum information processing (Print). 2013, Vol 12, Num 2, pp 907-920, issn 1570-0755, 14 p.Article

Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codesHONG LAI; JINGHUA XIAO; ORGUN, Mehmet A et al.Quantum information processing (Print). 2014, Vol 13, Num 4, pp 895-907, issn 1570-0755, 13 p.Article

Secure multiparty quantum secret sharing with the collective eavesdropping-check characterGAN GAO.Quantum information processing (Print). 2013, Vol 12, Num 1, pp 55-68, issn 1570-0755, 14 p.Article

On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited FeedbackBASHAR, Shafi; ZHI DING; GEOFFREY YE LI et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 4, pp 1212-1223, issn 1536-1276, 12 p.Article

Divertible and subliminal-free zero-knowledge proofs for languagesBURMESTER, M; DESMEDT, Y. G; ITOH, T et al.Journal of cryptology. 1999, Vol 12, Num 3, pp 197-223, issn 0933-2790Article

On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article

Information theoretically secure communication in the limited storage space modelAUMANN, Y; RABIN, M. O.Lecture notes in computer science. 1999, pp 65-79, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Developing in technology in the fight against fraudVEDDER, K.GSM world congress. 1996, pp 1-11Conference Paper

Eavesdropping Through Mobile PhoneLIN, Yi-Bing; TSAI, Meng-Hsun.IEEE transactions on vehicular technology. 2007, Vol 56, Num 6, pp 3596-3600, issn 0018-9545, 5 p., 1Article

Secure Communications with Untrusted Secondary Nodes in Cognitive Radio NetworksHYOUNGSUK JEON; MCLAUGHLIN, Steven W; KIM, Il-Min et al.IEEE transactions on wireless communications. 2014, Vol 13, Num 4, pp 1790-1805, issn 1536-1276, 16 p.Article

Multiaccess Channel With Partially Cooperating Encoders and Security ConstraintsZOHAIB HASSAN AWAN; ZAIDI, Abdellatif; VANDENDORPE, Luc et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1243-1254, issn 1556-6013, 12 p.Article

Mutual Information Games in Multiuser Channels With Correlated JammingSHAFIEE, Shabnam; ULUKUS, Sennur.IEEE transactions on information theory. 2009, Vol 55, Num 10, pp 4598-4607, issn 0018-9448, 10 p.Article

On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet InputBASHAR, Shafi; ZHI DING; CHENGSHAN XIAO et al.IEEE communications letters. 2011, Vol 15, Num 5, pp 527-529, issn 1089-7798, 3 p.Article

From the Archives: Colonel Butler's Satire of Bletchley ParkGREY, Christopher.Cryptologia. 2014, Vol 38, Num 3, pp 266-275, issn 0161-1194, 10 p.Article

From Identification to Signatures Via the Fiat-Shamir Transform : Necessary and Sufficient Conditions for Security and Forward-SecurityABDALLA, Michel; JEE HEA AN; BELLARE, Mihir et al.IEEE transactions on information theory. 2008, Vol 54, Num 8, pp 3631-3646, issn 0018-9448, 16 p.Article

Interplant volatile signaling in willows: revisiting the original talking treesPEARSE, Ian S; HUGHES, Kathy; SHIOJIRI, Kaori et al.Oecologia. 2013, Vol 172, Num 3, pp 869-875, issn 0029-8549, 7 p.Article

The Jack Butcher Case: A Story of Courage, Commitment, and ConcernFLYNN, William G; MANEKI, Sharon.Cryptologia. 2013, Vol 37, Num 3, pp 210-214, issn 0161-1194, 5 p.Article

Wiretap Channel With Side InformationYANLING CHEN; HAN VINCK, A. J.IEEE transactions on information theory. 2008, Vol 54, Num 1, pp 395-402, issn 0018-9448, 8 p.Article

Randomized quantum key distributionSHER, Muhammad; MUSHARRAF, Muhammad; MAGEDANZ, Thomas et al.Journal of optical communications. 2006, Vol 27, Num 5, pp 278-281, issn 0173-4911, 4 p.Article

  • Page / 16