Academic literature on the topic 'Incumbent User Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Incumbent User Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Incumbent User Privacy"
Milanović, Nemanja, Miloš Milosavljević, Slađana Benković, Dušan Starčević, and Željko Spasenić. "An Acceptance Approach for Novel Technologies in Car Insurance." Sustainability 12, no. 24 (December 10, 2020): 10331. http://dx.doi.org/10.3390/su122410331.
Full textMahdavi, Paasha. "Explaining the Oil Advantage: Effects of Natural Resource Wealth on Incumbent Reelection in Iran." World Politics 67, no. 2 (February 10, 2015): 226–67. http://dx.doi.org/10.1017/s0043887114000392.
Full textAvenburg, Alejandro. "Public Costs versus Private Gain: Assessing the Effect of Different Types of Information about Corruption Incidents on Electoral Accountability." Journal of Politics in Latin America 11, no. 1 (April 2019): 71–108. http://dx.doi.org/10.1177/1866802x19840457.
Full textSutton, Teresa. "Advowsons and Private Patronage." Ecclesiastical Law Journal 21, no. 3 (September 2019): 267–88. http://dx.doi.org/10.1017/s0956618x19000681.
Full textAnand, Manoj, and Jagandeep Singh. "AGR Challenge for Bharti Airtel and Vodafone Idea." Vision: The Journal of Business Perspective 25, no. 2 (May 16, 2021): 233–55. http://dx.doi.org/10.1177/0972262921991932.
Full textGuijarro, Luis, Vicent Pla, Jose R. Vidal, and Jorge Martinez-Bauset. "Entry, Competition, and Regulation in Cognitive Radio Scenarios: A Simple Game Theory Model." Mathematical Problems in Engineering 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/620972.
Full textNjapau, Georginah, and John Luangala. "Learning to Read in English in Different Environments: A Case of Selected Schools in Lusaka and Mufulira Districts." Journal of Law and Social Sciences 2, no. 1 (January 27, 2021): 69–85. http://dx.doi.org/10.53974/unza.jlss.2.1.433.
Full textAllen, Pauline, Simon Turner, Will Bartlett, Virginie Perotin, Greenwell Matchaya, and Bernarda Zamora. "Provider Diversity in the English NHS: A Study of Recent Developments in Four Local Health Economies." Journal of Health Services Research & Policy 17, no. 1_suppl (January 2012): 23–30. http://dx.doi.org/10.1258/jhsrp.2011.011015.
Full textOlander, Petrus. "Economic Diversification and Institutional Quality—Issues of Concentrated Interests." Studies in Comparative International Development 54, no. 3 (September 2019): 346–64. http://dx.doi.org/10.1007/s12116-019-09287-0.
Full textMcLaughlin, Eoin. "An experiment in banking the poor: the Irish Mont-de-Piété, c. 1830–1850." Financial History Review 20, no. 1 (November 27, 2012): 49–72. http://dx.doi.org/10.1017/s0968565012000194.
Full textDissertations / Theses on the topic "Incumbent User Privacy"
Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Full textMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Ben-Mosbah, Azza. "Privacy-preserving spectrum sharing." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0008/document.
Full textRadio frequencies, as currently allocated, are statically managed. Spectrum sharing between commercial users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effectiveness in spectrum use. However, allowing secondary users to share frequency bands with sensitive government incumbent users creates new privacy threats in the form of inference attacks. Therefore, the aim of this thesis is to enhance the privacy of the incumbent while allowing secondary access to the spectrum. First, we present a brief description of different sharing regulations and privacy requirements in Federal bands. We also survey the privacy-preserving techniques (i.e., obfuscation) proposed in data mining and publishing to thwart inference attacks. Next, we propose and implement our approach to protect the operational frequency and location of the incumbent operations from inferences. We follow with research on frequency protection using inherent and explicit obfuscation to preserve the incumbent's privacy. Then, we address location protection using trust as the main countermeasure to identify and mitigate an inference risk. Finally, we present a risk-based framework that integrates our work and accommodates other privacy-preserving approaches. This work is supported with models, simulations and results that showcase our work and quantify the importance of evaluating privacy-preserving techniques and analyzing the trade-off between privacy protection and spectrum efficiency
Book chapters on the topic "Incumbent User Privacy"
Li, He, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky, and Jung-Min Park. "Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 55–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_6.
Full textZabransky, Douglas, He Li, Chang Lu, and Yaling Yang. "SZ-SAS: A Framework for Preserving Incumbent User Privacy in SAS-Based DSA Systems." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 78–88. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_8.
Full textFlanagan, Anne. "Authorization and Licensing." In Telecommunications Law and Regulation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198807414.003.0009.
Full textBianchi, Robert R. "Indonesia." In China and the Islamic World, 63–79. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190915285.003.0006.
Full textHunter, M. Gordon. "Information Systems and Small Business." In Business Information Systems, 54–59. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-969-9.ch004.
Full textPanaïté, Oana. "Archives." In Postcolonial Realms of Memory, 23–33. Liverpool University Press, 2020. http://dx.doi.org/10.3828/liverpool/9781789620665.003.0002.
Full textConference papers on the topic "Incumbent User Privacy"
Li, He, Yanzhi Dou, Chang Lu, Doug Zabransky, Yaling Yang, and Jung-Min Jerry Park. "Preserving the Incumbent Users’ Location Privacy in the 3.5 GHz Band." In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2018. http://dx.doi.org/10.1109/dyspan.2018.8610470.
Full textDou, Yanzhi, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.322.
Full textDou, Yanzhi, He Li, Kexiong Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems." In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.40.
Full textDou, Yanzhi, Kexiong (Curtis) Zeng, Yaling Yang, and Kui Ren. "Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems." In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985283.
Full textSalama, Ahmed M., Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz. "Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149191.
Full text