Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Confidentiality

Known as: Commercial confidence, Strict confidence, Professional secrecy 
Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Review
2019
Review
2019
Abstract The results of IoT failures can be severe, therefore, the study and research in security issues in the IoT is of extreme… Expand
Review
2019
Review
2019
The engineering vision of relying on the “smart sky” for supporting air traffic and the “internet-above-the-clouds” for in-flight… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Review
2019
Review
2019
  • Y. Lu, L. D. Xu
  • IEEE Internet of Things Journal
  • 2019
  • Corpus ID: 70086165
As an emerging technology, the Internet of Things (IoT) revolutionized the global network comprising of people, smart devices… Expand
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Review
2019
Review
2019
Abstract Storing and communicating secret and/or private information has become part of our daily life whether it is for our… Expand
Review
2019
Review
2019
Modern cars consist of a number of complex embedded and networked systems with steadily increasing requirements in terms of… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Review
2018
Review
2018
Data is the lifeblood of any business. Today, big data has applications in just about every industry – retail, healthcare… Expand
  • table 1
Review
2017
Review
2017
A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era… Expand
Highly Cited
2011
Highly Cited
2011
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
1978
Highly Cited
1978
Given two discrete memoryless channels (DMC's) with a common input, it is desired to transmit private messages to receiver 1 rate… Expand
  • figure 1