نتایج جستجو برای: security communication

تعداد نتایج: 505280  

Journal: :IJCWT 2013
Tuija Kuusisto Rauno Kuusisto

The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...

2007
Debin Liu Farzaneh Asgharpour L. Jean Camp

In computer security, risk communication refers to a mechanism used to inform computer users against a given threat. Efficacy of risk communication depends not only on the nature of the risk, but also alignment between the conceptual model of the risk communicator and the user’s perception or mental model of the risk. The gap between the mental model of the security experts and non-experts coul...

Journal: :international journal of electrical and electronics engineering 0
maryam borna دانشگاه صنعتی مالک اشتر mohammad hossein madani دانشگاه صنعتی مالک اشتر

wireless communication is the major form of connection nowadays. in most cases it exploits the benefits of the spread spectrum techniques to overcome channel introduced corruptions like doppler residual frequency, noise, interference and jamming. these techniques also enhance the security and quality of the link. using long spreading pseudo-noise codes provides further security for the link tho...

2009
Erik-Oliver Blass Martina Zitterbart

Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security s...

2013
Hidema Tanaka

We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum communication. Confidential modulationrealizes a secret communication by using secret information for modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication. The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical ...

M. S. Abolghasemi R. Ebrahimi Atani, T. Y. Rezapour,

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

2006
Sjouke Mauw Ivo van Vessem Bert Bos

We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshn...

2012
Ki Hyun Kim Jang - Hee Yoo Kyo Il Chung

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...

2007
Matthias Gerlach Andreas Festag Tim Leinmüller Gabriele Goldacker Charles Harsch

Despite recent progress for vehicular communication in research, development, field tests, and standardization, security is still in an early phase though it represents a crucial part of the vehicular communication system. So far, no vehicular security architecture has been proposed which integrates existing individual solutions for vehicle registration, data integrity, authentication, and so o...

2007
Farzaneh Asgharpour Debin Liu L. Jean Camp

Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on the alignment between the conceptual model embedded in the risk communication and the recipients’ perception of the risk. The difference between these communicated and perceived mental models could lead to ineffective r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید