Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
11,395
result(s) for
"Secrecy"
Sort by:
Something to hide : a novel
Four women from different backgrounds, each with something to hide, cross paths in West Africa and begin to discover the impact of their actions.
Dissimulation and the Culture of Secrecy in Early Modern Europe
2009
\"Larvatus prodeo,\" announced René Descartes at the beginning of the seventeenth century: \"I come forward, masked.\" Deliberately disguising or silencing their most intimate thoughts and emotions, many early modern Europeans besides Descartes-princes, courtiers, aristocrats and commoners alike-chose to practice the shadowy art of dissimulation. For men and women who could not risk revealing their inner lives to those around them, this art of incommunicativity was crucial, both personally and politically. Many writers and intellectuals sought to explain, expose, justify, or condemn the emergence of this new culture of secrecy, and from Naples to the Netherlands controversy swirled for two centuries around the powers and limits of dissimulation, whether in affairs of state or affairs of the heart. This beautifully written work crisscrosses Europe, with a special focus on Italy, to explore attitudes toward the art of dissimulation in the sixteenth and seventeenth centuries. Discussing many canonical and lesser-known works, Jon R. Snyder examines the treatment of dissimulation in early modern treatises and writings on the court, civility, moral philosophy, political theory, and in the visual arts.
Secrecy Performance Analysis of Backscatter Communications with Side Information
by
Rostami Ghadi, Farshad
,
Yan, Zheng
,
Jäntti, Riku
in
average secrecy capacity
,
backscatter communication
,
secrecy outage probability
2023
Backscatter communication (BC) systems are a promising technology for internet of things (IoT) applications that allow devices to transmit information by modulating ambient radio signals without the need for a dedicated power source. However, the security of BC systems is a critical concern due to the vulnerability of the wireless channel. This paper investigates the impact of side information (SI) on the secrecy performance of BC systems. SI mainly refers to the additional knowledge that is available to the communicating parties beyond transmitted data, which can be used to enhance reliability, efficiency, security, and quality of service in various communication systems. In particular, in this paper, by considering a non-causally known SI at the transmitter, we derive compact analytical expressions of average secrecy capacity (ASC) and secrecy outage probability (SOP) for the proposed system model to analyze how SI affects the secrecy performance of BC systems. Moreover, a Monte Carlo simulation validates the accuracy of our analytical results and reveals that considering such knowledge at the transmitter has constructive effects on the system performance and ensures reliable communication with higher rates than the conventional BC systems without SI, namely, lower SOP and higher ASC are achievable.
Journal Article
A veil of spears
Since the Night of Endless Swords, a bloody battle the Kings of Sharakhai narrowly won, the kings have been hounding the rebels known as the Moonless Host. Many have been forced to flee the city, including Çeda, who discovers that the King of Sloth is raising his army to challenge the other kings' rule. When Çeda finds the remaining members of the Moonless Host, now known as the thirteenth tribe, she sees a tenuous existence. Çeda hatches a plan to return to Sharakhai and free the asirim, the kings' powerful, immortal slaves. The kings, however, have sent their greatest tactician, the King of Swords, to bring Çeda to justice for her crimes. But the once-unified front of the kings is crumbling. The surviving kings vie quietly against one another, maneuvering for control over Sharakhai. Çeda hopes to use that to her advantage, but whom to trust? Any of them might betray her. As Çeda works to lift the shackles from the asirim and save the thirteenth tribe, the kings of Sharakhai, the scheming queen of Qaimir, the ruthless blood mage, Hamzakiir, and King of Swords all prepare for a grand clash that may decide the fate of all.
Secure Performance Analysis of Satellite-Terrestrial Networks-Assisted Backscatter Device
by
Quang Sang Nguyen
,
Si Phu Le
,
Hong Nhu Nguyen
in
backscatter communication; secrecy outage probability; ergodic secrecy capacity; symbol error rate; physical layer security
2025
This study investigates the secrecy performance of a satellite–backscatter device communication system in the presence of a potential eavesdropper. In the considered setup, a satellite transmits signals to a backscatter device, which reflects the modulated information back to the satellite while being subject to interception by an eavesdropper. To capture the practical wireless environment, the analysis is conducted over correlated Nakagami-$m$ fading channels, where the coupling among the forward, backscatter, and wiretap links is explicitly taken into account. We derive exact closed-form analytical expressions for key secrecy metrics, namely the secrecy outage probability (SOP), the ergodic secrecy capacity (ESC), and the symbol error rate (SER), which provide comprehensive insights into the secure operation of the system. Furthermore, asymptotic expressions are obtained for the SOP, enabling a deeper understanding of the secrecy diversity order under high signal-to-noise ratio (SNR) regimes. The impacts of critical channel and system parameters, such as fading severity, correlation, user power, and eavesdropper power, on the SOP, ESC, and SER are thoroughly examined. Monte Carlo simulations are also performed to validate the accuracy of the theoretical analysis. [JJCIT 2025; 11(4.000): 484-498]
Journal Article
This is not over
Clashing over exchanged insults that compromise their reputations, a woman running from her sordid past and a doctor's wife who depends on tenant income risk everything to protect shattering secrets.
The Financial Secrecy Index: Shedding New Light on the Geography of Secrecy
2015
Both academic research and public policy debate around tax havens and offshore finance typically suffer from a lack of definitional consistency. Unsurprisingly then, there is little agreement about which jurisdictions ought to be considered as tax havens-or which policy measures would result in their not being so considered. In this article we explore and make operational an alternative concept, that of a secrecy jurisdiction and present the findings of the resulting Financial Secrecy Index (FSI). The FSI ranks countries and jurisdictions according to their contribution to opacity in global financial flows, revealing a quite different geography of financial secrecy from the image of small island tax havens that may still dominate popular perceptions and some of the literature on offshore finance. Some major (secrecy-supplying) economies now come into focus. Instead of a binary division between tax havens and others, the results show a secrecy spectrum, on which all jurisdictions can be situated, and that adjustment for the scale of business is necessary in order to compare impact propensity. This approach has the potential to support more precise and granular research findings and policy recommendations.
Journal Article
Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
by
Suneel Yadav
,
Dinh-Thuan Do
,
Anshul Pandey
in
Chemical technology
,
Cognition
,
cognitive radio vehicular networks (CRVNs)
2021
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of ΘlnΩm2Ωe2 for large Ωm and Ωe, where Ωm and Ωe are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.
Journal Article