Academic literature on the topic 'Confidential communications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Confidential communications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Confidential communications"
Chang, Chin-Chen, and Ren-Junn Hwang. "A NEW SCHEME TO PROTECT CONFIDENTIAL IMAGES." Journal of Interconnection Networks 05, no. 03 (September 2004): 221–32. http://dx.doi.org/10.1142/s0219265904001131.
Full textHoltmanns, Silke, and Marcin Toczydlowski. "Confidential mobile mail retrieval." Computer Communications 26, no. 11 (July 2003): 1219–24. http://dx.doi.org/10.1016/s0140-3664(02)00256-6.
Full textLu, Jing Shuang, Chun Mei Du, Xin Guo, and Lei Zhang. "Research on Communications Encryption Technology Based on Integration of Digital Watermarking." Applied Mechanics and Materials 443 (October 2013): 425–29. http://dx.doi.org/10.4028/www.scientific.net/amm.443.425.
Full textSarikaya, Yunus, C. Emre Koksal, and Ozgur Ercetin. "Dynamic Network Control for Confidential Multi-Hop Communications." IEEE/ACM Transactions on Networking 24, no. 2 (April 2016): 1181–95. http://dx.doi.org/10.1109/tnet.2015.2414945.
Full textGeorgiou, Chryssis, Seth Gilbert, and Dariusz R. Kowalski. "Confidential gossip." Distributed Computing 33, no. 5 (December 3, 2019): 367–92. http://dx.doi.org/10.1007/s00446-019-00367-x.
Full textPirandola, S., S. L. Braunstein, S. Lloyd, and S. Mancini. "Confidential Direct Communications: A Quantum Approach Using Continuous Variables." IEEE Journal of Selected Topics in Quantum Electronics 15, no. 6 (2009): 1570–80. http://dx.doi.org/10.1109/jstqe.2009.2021147.
Full textAbbas, Mohammed Adil, Hojin Song, and Jun-Pyo Hong. "Secure Wireless Communications in Broadcast Channels With Confidential Messages." IEEE Access 7 (2019): 170525–33. http://dx.doi.org/10.1109/access.2019.2955603.
Full textYang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries." Informatics 9, no. 3 (September 5, 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Full textLewis, David P. "Protecting your confidential information." Computer Law & Security Review 4, no. 4 (November 1988): 28–31. http://dx.doi.org/10.1016/0267-3649(88)90150-1.
Full textJuneja, Mamta. "A Covert Communication Model-Based on Image Steganography." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 19–37. http://dx.doi.org/10.4018/ijisp.2014010102.
Full textDissertations / Theses on the topic "Confidential communications"
Shaughnessy, Patricia L. "The attorney-client privilege : a comparative study of American, Swedish and EU law /." Stockholm : Stockholm University, Law Dept, 2001. http://bibpurl.oclc.org/web/31292.
Full textFloyd, Kelly. "A content analysis of the use of confidential sources in 2006 by Time and Newsweek." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/359.
Full textGonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.
Full textDahlstrom, Glenda. "Privacy and confidentiality of patient health information." MU has:, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3052167.
Full textWardlow, Lane Liane Christine. "Not saying what's on your mind how speakers avoid grounding references in privileged information /." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3258707.
Full textTitle from first page of PDF file (viewed June 5, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
Sheehy, Michael W. "From Watergate to Lewinsky : unnamed sources in the Washington post, 1970-2000 /." View abstract, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220619.
Full textBerry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.
Full textTitle from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
Chirichiello, Michela. "Confidentiality and public interest in mixed international arbitration." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19633.
Full textEdvalson, Michael George. "TrustBroker : a defense against identity theft from online transactions /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1149.pdf.
Full textArslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.
Full textBooks on the topic "Confidential communications"
Pattenden, Rosemary. The law of professional-client confidentiality: Regulating the disclosure of confidential personal information. Oxford: Oxford University Press, 2003.
Find full text1946-, Walkowiak Vincent S., ed. Attorney-client privilege in civil litigation: Protecting and defending confidentiality. 3rd ed. Chicago: ABA, 2004.
Find full textLaw Reform Commission of Western Australia. Discussion paper on professional privilege for confidential communications. [Perth, W.A.]: The Commission, 1991.
Find full textLaw Reform Commission of Western Australia. Report on professional peivilege for confidential communications. [Perth, W. Austr.]: The Commission, 1993.
Find full textLambert, Pierre. Le secret professionnel. Bruxelles: Nemesis, 1985.
Find full textPeltier, Virginie. Le secret des correspondances. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1999.
Find full textGreenwald, David M. Testimonial privileges. 3rd ed. [Eagan, Minn.]: Thomson/West, 2005.
Find full textReid, Brian C. Confidentiality and the law. London: Waterlow, 1986.
Find full textDamien, André. Le secret nécessaire. Paris: Desclée de Brouwer, 1989.
Find full textAzerrad, Marcos Edgardo. El secreto profesional y el deber de confidencialidad: La violación del secreto como figura penal, el secreto médico, el secreto religioso, el secreto profesional del abogado ... Mendoza [Argentina]: Cuyo, 2002.
Find full textBook chapters on the topic "Confidential communications"
Fouracres, Alexandra J. S. "Keeping communications confidential." In Cybersecurity for Coaches and Therapists, 78–94. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003184805-5.
Full textBeaupré, Yannick, Michel Barbeau, and Stéphane Blouin. "Underwater Confidential Communications in JANUS." In Foundations and Practice of Security, 255–70. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30122-3_16.
Full textJi, Chenglan, Zhenyu Na, and Zilong Feng. "Confidential Communications for Mobile UAV Relaying Network." In Cognitive Radio Oriented Wireless Networks and Wireless Internet, 240–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98002-3_18.
Full textAl Bouhairi, Mohamad Jamil, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko, and Sebastian Clauss. "Encryption Proxies in a Confidential Computing Environment." In Communications in Computer and Information Science, 366–79. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0272-9_25.
Full textJekateryńczuk, Gabriel, and Zbigniew Piotrowski. "Exploring the Potential of OLSR Steganography for Confidential Communication." In Communications in Computer and Information Science, 131–34. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62843-6_14.
Full textMolina-Jiménez, Carlos, and Lindsay Marshall. "Anonymous and Confidential Communications from an IP Addressless Computer." In Handheld and Ubiquitous Computing, 383–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_54.
Full textGiri, Debasis, Prithayan Barua, P. D. Srivastava, and Biswapati Jana. "A Cryptosystem for Encryption and Decryption of Long Confidential Messages." In Communications in Computer and Information Science, 86–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_9.
Full textKarimi, Leila, Seyyed Ahmad Javadi, Mohammad Ali Hadavi, and Rasool Jalili. "Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?" In Communications in Computer and Information Science, 92–104. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10903-9_8.
Full textFlepp-Stars, Bubi G., Herbert Stögner, and Andreas Uhl. "Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 252–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_21.
Full textNawaz, Yasir, Lei Wang, and Kamel Ammour. "Processing Analysis of Confidential Modes of Operation." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 98–110. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05345-1_8.
Full textConference papers on the topic "Confidential communications"
Tang, Xiaojun, Ruoheng Liu, Predrag Spasojevic, and H. Vincent Poor. "Coding schemes for confidential communications." In 2008 Information Theory and Applications Workshop (ITA). IEEE, 2008. http://dx.doi.org/10.1109/ita.2008.4601077.
Full textLiu, Ruoheng, Ivana Maric, Predrag Spasojevic, and Roy D. Yates. "Multi-Terminal Communications with Confidential Messages." In 2007 Information Theory and Applications Workshop. IEEE, 2007. http://dx.doi.org/10.1109/ita.2007.4357605.
Full textVazquez, Miguel Angel, Ana Perez-Neira, and Miguel Angel Lagunas. "Confidential communication in downlink beamforming." In 2012 IEEE 13th Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2012). IEEE, 2012. http://dx.doi.org/10.1109/spawc.2012.6292925.
Full textEngelmann, Felix, Jan Philip Speichert, Ralf God, Frank Kargl, and Christoph Bösch. "Confidential Token-Based License Management." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3462223.3485619.
Full textPfennig, Stefan, and Elke Franz. "Security aspects of confidential network coding." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7996934.
Full textTieyan Li and Yongdong Wu. "Resilient aggregation scheme for confidential sensor reports." In 2007 IEEE International Conference on Communications. IEEE, 2007. http://dx.doi.org/10.1109/icc.2007.247.
Full textZivari-Fard, Hassan, Bahareh Akhbari, Mahmoud Ahmadian-Attari, and Mohammad Reza Aref. "Compound Multiple Access Channel with confidential messages." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883604.
Full textArora, Anish, and Lifeng Sang. "Symmetric dialog codes for confidential communications without shared secrets." In 2010 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2010. http://dx.doi.org/10.1109/spcom.2010.5560465.
Full textKhalaf, Taha, and Sang Wu Kim. "Confidential Spatial Multiplexing in the Presence of Eavesdropper." In MILCOM 2013 - 2013 IEEE Military Communications Conference. IEEE, 2013. http://dx.doi.org/10.1109/milcom.2013.167.
Full textWei, Qian, Jingsha He, and Xing Zhang. "Initial Distribution of Group Keys for Confidential Group Communication." In 2010 International Conference on Communications and Mobile Computing (CMC). IEEE, 2010. http://dx.doi.org/10.1109/cmc.2010.97.
Full text