نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wireline and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to c...
Security is one of the main concerns in current telecommunication networks: the service providers and individual users have to protect themselves against attacks, and to this end a careful analysis of their optimal strategies is of essential importance. Indeed, attackers and defenders are typically agents trying strategically to design the most important damages and the most secure use of the r...
The specifics of modern information and telecommunication networks in transport, as an object security control, are investigated. main trends the development network protection technologies (TNPT) have been identified. presence interrelation integrative properties: readiness, mobility, throughput, stealth, accessibility, manageability, which is a consequence convergence transmission processing ...
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this is the lack of location verification techniques with global coverage. Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been propo...
Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud based platforms. Because of the distributed nature, cloud computing environments are aim for intruders looking for possible vulnerabilities to exploit. However, with the increasing use of cloud computing, security issues are came out on a growing scale. It is needful to solve these secu...
This paper proposes a security service robot that is working in ubiquitous environment. The system is organized based on TCP/IP communication and Cognitive Robotic Engine (CRE) for intelligent control. CRE, that is proposed by Sukhan Lee, et al [1], provides asynchronous and concurrent processing architecture, uncertainty control, and behavior selection for the accomplishment of missions. The t...
During service discovery, preserving privacy of end users and service providers is one of the challenging research issues in ubiquitous computing environment (UCE). To solve this issue, we define service group and classify it into two cases: public service and private service. End users’ privacy is important in public service group while privacy of end users and service providers are important ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید