نتایج جستجو برای: security communication
تعداد نتایج: 505280 فیلتر نتایج به سال:
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. F...
In computer security, risk communication refers to a mechanism used to inform computer users against a given threat. Efficacy of risk communication depends not only on the nature of the risk, but also alignment between the conceptual model of the risk communicator and the user’s perception or mental model of the risk. The gap between the mental model of the security experts and non-experts coul...
wireless communication is the major form of connection nowadays. in most cases it exploits the benefits of the spread spectrum techniques to overcome channel introduced corruptions like doppler residual frequency, noise, interference and jamming. these techniques also enhance the security and quality of the link. using long spreading pseudo-noise codes provides further security for the link tho...
Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security s...
We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum communication. Confidential modulationrealizes a secret communication by using secret information for modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication. The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical ...
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshn...
This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...
Despite recent progress for vehicular communication in research, development, field tests, and standardization, security is still in an early phase though it represents a crucial part of the vehicular communication system. So far, no vehicular security architecture has been proposed which integrates existing individual solutions for vehicle registration, data integrity, authentication, and so o...
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on the alignment between the conceptual model embedded in the risk communication and the recipients’ perception of the risk. The difference between these communicated and perceived mental models could lead to ineffective r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید