نتایج جستجو برای: secure communication
تعداد نتایج: 391555 فیلتر نتایج به سال:
Secure and trusted group communication is an active area of research. The growing importance of group communication based applications fuelled its popularity. The central research challenge is secure and efficient group key management. . The main issue in secure group communication is group dynamics and key management. A scalable secure group communication model ensures that whenever there is a...
network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find the book here. Never worry not to find what you need. Is the network security with openssl cryptography for secure communications your needed book now? That's true; you are really a good reader. This is a perfect book that comes from great author to share with you. The book ...
Given an interpreted system, we investigate ways for two agents to communicate secrets by public announcements. For card deals, the problem to keep all of your cards a secret (i) can be distinguished from the problem to keep some of your cards a secret (ii). For (i): we characterize a novel class of protocols consisting of two announcements, for the case where two agents both hold n cards and t...
The ongoing progress in networking security, together with the growing range of robot applications in many fields of everyday life, makes robotics tangible reality in our near future. Accordingly, new advanced services, depends on the interplay between the robotics and cyber security, are being an important role in robotics world. This paper addresses technological implications of security enha...
Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor node requires communicating among each other or with base stat...
As an important application of chaotic dynamical systems, chaos-based secure communication and cryptography attracted continuous interest over the last decade. It studies methods of controlling deterministic systems with chaotic behavior. Moreover, it is easy to notice the possibility of substantial variation of the characteristics of chaotic systems by relatively small variations of their para...
In recent years, chaotic attractors have been extensively used in the design of secure communication systems. One of the preferred ways of transmitting the information signal is binary chaotic modulation, in which a binary message modulates a parameter of the chaotic generator. This paper presents a method of attack based on estimating the short-time period of the ciphertext generated from the ...
This paper provides a brief overview of wireless (WiFi) networks and some of the security measures in place today. We further seek to find a secure way to authenticate and enable secure communication between wireless (WiFi) clients and external networks.
Chaotic synchronization is the key technology of secure communication. In this paper, an impulsive control method for chaotic synchronization of two coupled Lorenz chaotic system was proposed. The global asymptotic synchronization of two Lorenz systems was realized by using the linear error feedback of the state variables of the drive system and the response system as impulsive control signal. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید