نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2002
AZZEDINE BOUKERCHE

The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wireline and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to c...

2009
Patrick Maillé Peter Reichl Bruno Tuffin

Security is one of the main concerns in current telecommunication networks: the service providers and individual users have to protect themselves against attacks, and to this end a careful analysis of their optimal strategies is of essential importance. Indeed, attackers and defenders are typically agents trying strategically to design the most important damages and the most secure use of the r...

Journal: : 2023

The specifics of modern information and telecommunication networks in transport, as an object security control, are investigated. main trends the development network protection technologies (TNPT) have been identified. presence interrelation integrative properties: readiness, mobility, throughput, stealth, accessibility, manageability, which is a consequence convergence transmission processing ...

2010
Georg T. Becker Sherman C. Lo David S. De Lorenzo Per K. Enge Christof Paar

The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this is the lack of location verification techniques with global coverage. Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been propo...

2013
P. Praveen Kumar Bhaskar Naik

Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud based platforms. Because of the distributed nature, cloud computing environments are aim for intruders looking for possible vulnerabilities to exploit. However, with the increasing use of cloud computing, security issues are came out on a growing scale. It is needful to solve these secu...

2007
Hunsue Lee Jangwon Lee Jaewoong Kim Sukhan Lee

This paper proposes a security service robot that is working in ubiquitous environment. The system is organized based on TCP/IP communication and Cognitive Robotic Engine (CRE) for intelligent control. CRE, that is proposed by Sukhan Lee, et al [1], provides asynchronous and concurrent processing architecture, uncertainty control, and behavior selection for the accomplishment of missions. The t...

2008
Jangseong Kim Kwangjo Kim

During service discovery, preserving privacy of end users and service providers is one of the challenging research issues in ubiquitous computing environment (UCE). To solve this issue, we define service group and classify it into two cases: public service and private service. End users’ privacy is important in public service group while privacy of end users and service providers are important ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید