X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (594) 594
Newspaper Article (364) 364
Magazine Article (191) 191
Conference Proceeding (33) 33
Reference (32) 32
Book / eBook (30) 30
Transcript (28) 28
Newsletter (26) 26
Book Chapter (18) 18
Government Document (13) 13
Dissertation (7) 7
Streaming Video (6) 6
Book Review (2) 2
Paper (2) 2
Publication (2) 2
Trade Publication Article (2) 2
Web Resource (2) 2
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
confidential communications (970) 970
laws, regulations and rules (307) 307
attorneys (184) 184
engineering, electrical & electronic (136) 136
usage (124) 124
management (122) 122
analysis (116) 116
confidentiality (112) 112
privacy (110) 110
electronic mail systems (109) 109
confidential messages (106) 106
access control (91) 91
receivers (85) 85
privacy, right of (84) 84
humans (80) 80
press (78) 78
security (74) 74
broadcast channels (73) 73
investigations (73) 73
computer science, information systems (72) 72
safety and security measures (72) 72
ethical aspects (70) 70
telecommunications (70) 70
methods (66) 66
confidential relationships (64) 64
research (61) 61
physicians (58) 58
data security (57) 57
legal ethics (56) 56
channels (54) 54
internet (53) 53
secrecy (51) 51
communication (50) 50
transmitters (50) 50
messages (46) 46
wiretap channel (46) 46
disclosure (45) 45
decoding (44) 44
cryptography (41) 41
encoding (41) 41
journalists (41) 41
ethics (40) 40
medical records (40) 40
physical layer security (40) 40
data encryption (38) 38
index medicus (38) 38
law (38) 38
female (37) 37
interference (37) 37
secrecy capacity (37) 37
banking (36) 36
computer science (36) 36
computer science, theory & methods (36) 36
confidential information (36) 36
political aspects (36) 36
mimo (35) 35
united states (35) 35
privileged communication (34) 34
broadcasting (33) 33
evaluation (32) 32
fading channels (32) 32
information theory (30) 30
networks (29) 29
optimization (29) 29
capacity (28) 28
electronic surveillance (28) 28
secrecy capacity region (28) 28
studies (28) 28
journalism (27) 27
male (27) 27
random variables (27) 27
social aspects (27) 27
wireless communication (27) 27
civil rights (26) 26
computer science - information theory (26) 26
computer security (26) 26
freedom of the press (26) 26
wire-tap channel (26) 26
algorithms (25) 25
confidential message (25) 25
information (25) 25
social networks (25) 25
social media (24) 24
adult (22) 22
nondisclosure agreements (22) 22
records and correspondence (22) 22
right of privacy (22) 22
wireless networks (22) 22
wiretapping (22) 22
education (21) 21
national security (21) 21
practice (21) 21
surveys (21) 21
information technology (20) 20
litigation (20) 20
medical ethics (20) 20
antennas (19) 19
classified information (19) 19
gaussian (19) 19
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (7) 7
Collection Dvlpm't (Acquisitions) - Vendor file (4) 4
Law (Bora Laskin) - Stacks (3) 3
UofT at Mississauga - Stacks (3) 3
Engineering & Comp. Sci. - Stacks (2) 2
Online Resources - Online (2) 2
UTL at Downsview - May be requested (2) 2
UofT at Scarborough - Stacks (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Faculty of Information - Stacks (1) 1
Gerstein Science - Stacks (1) 1
Law (Bora Laskin) - Theses (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
Trinity College (John W Graham) - Stacks (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE transactions on information theory, ISSN 1557-9654, 2016, Volume 62, Issue 5, pp. 2355 - 2409
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 09/2010, Volume 56, Issue 9, pp. 4215 - 4227
Journal Article
2012, ISBN 1439846219, xix, 282
.... First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc... 
Coding theory | Data encryption (Computer science) | Confidential communications | Electronics in espionage | Data transmission systems
Book
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 02/2016, Volume 11, Issue 2, pp. 410 - 425
Journal Article
IEEE Communications surveys and tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 3, pp. 1550 - 1573
Journal Article
International Journal of Security and Networks, ISSN 1747-8405, 2015, Volume 10, Issue 1, pp. 20 - 31
...., the number of messages one user sent to another. We construct an anonymity metric that measures the extent to which the system-wide communication pattern of all users... 
Privacy | Anonymity | Shannon entropy | Infeasibility attack | Combinatorial matrix theory | Graph theory | Measuring anonymity | Anonymity metric | Networks | Construction | Messages | Communication systems | Hides | Handles | Security
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 03/2013, Volume 59, Issue 3, pp. 1346 - 1359
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 04/2013, Volume 59, Issue 4, pp. 2142 - 2152
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 09/2013, Volume 31, Issue 9, pp. 1901 - 1908
The integration of multiple services such as the transmission of private, common, and confidential messages at the physical layer is becoming important for future wireless networks in order... 
Continuous wavelet transforms | bidirectional relaying | Error probability | confidential message | Receivers | Encoding | Decoding | Complexity theory | physical layer security | Relays | Polar codes | bidirectional broadcast channel | CAPACITY | CODES | PROTOCOLS | RELAY CHANNELS | WIRETAP | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 05/2011, Volume 57, Issue 5, pp. 2730 - 2745
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 10/2014, Volume 9, Issue 10, pp. 1720 - 1732
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 02/2013, Volume 8, Issue 2, pp. 324 - 334
.... In the broadcast phase, the relay transmits not only the two bidirectional messages it received in the previous multiple access phase, but also an additional confidential message to one node... 
strong secrecy | Forensics | Receivers | Bidirectional broadcast channel | Physical layer | Decoding | Security | capacity region | Relays | bidirectional relaying | Wireless networks | confidential message | physical layer security | wireless network | CAPACITY | ENGINEERING, ELECTRICAL & ELECTRONIC | SECURE TRANSMISSION | INTERFERENCE | COMPUTER SCIENCE, THEORY & METHODS | RELAY CHANNEL | Communication channels | Relay | Messages | Bidirectional | Broadcasting | Strategy | Spectra | Channels
Journal Article
IEEE transactions on vehicular technology, ISSN 1939-9359, 2018, Volume 67, Issue 7, pp. 6658 - 6662
Journal Article
2014, ISBN 1452258759, Volume 2, 3
... and behavior, or change existing negative health attitudes and behaviors. Important aspects of persuasion are message structure, such as the number and order of arguments... 
Advertising campaigns | Persuasion (Psychology) | Confidential communications | Medical communication | Health behavior | Meta-analysis
Reference
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.