Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Confidentiality

Known as: Commercial confidence, Strict confidence, Professional secrecy 
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received… Expand
  • table I
  • table II
  • table IV
  • figure 1
  • figure 2
Is this relevant?
Review
2018
Review
2018
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2018
Review
2018
The Internet of Things (IoT) now permeates our daily lives, providing important measurement and collection tools to inform our… Expand
  • figure 2
  • figure 3
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
Review
2017
Review
2017
Building the Internet of Things requires deploying a huge number of objects with full or limited connectivity to the Internet… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2017
Review
2017
Automated and smart meters are devices that are able to monitor the energy consumption of electricity consumers in near real-time… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Review
2017
Review
2017
As smartphone penetration saturates, we are witnessing a new trend in personal mobile devices—wearable mobile devices or simply… Expand
  • figure 2
  • figure 1
  • table I
  • figure 3
  • table II
Is this relevant?
Review
2017
Review
2017
Abstract A vehicular Ad Hoc Network (VANET) is a class of mobile ad hoc network (MANET) which supports, vehicle to vehicle (V2V… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1978
Highly Cited
1978
Given two discrete memoryless channels (DMC's) with a common input, it is desired to transmit private messages to receiver 1 rate… Expand
  • figure 1
Is this relevant?