نتایج جستجو برای: secure communication

تعداد نتایج: 391555  

2018
Mary Vennila

Secure and trusted group communication is an active area of research. The growing importance of group communication based applications fuelled its popularity. The central research challenge is secure and efficient group key management. . The main issue in secure group communication is group dynamics and key management. A scalable secure group communication model ensures that whenever there is a...

2002
John Viega Matt Messier Pravir Chandra

network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find the book here. Never worry not to find what you need. Is the network security with openssl cryptography for secure communications your needed book now? That's true; you are really a good reader. This is a perfect book that comes from great author to share with you. The book ...

2011
Michael H. Albert Andrés Cordón-Franco Hans van Ditmarsch David Fernández-Duque Joost J. Joosten Fernando Soler-Toscano

Given an interpreted system, we investigate ways for two agents to communicate secrets by public announcements. For card deals, the problem to keep all of your cards a secret (i) can be distinguished from the problem to keep some of your cards a secret (ii). For (i): we characterize a novel class of protocols consisting of two announcements, for the case where two agents both hold n cards and t...

Journal: :CoRR 2015
Vibekananda Dutta Teresa Zielinska

The ongoing progress in networking security, together with the growing range of robot applications in many fields of everyday life, makes robotics tangible reality in our near future. Accordingly, new advanced services, depends on the interplay between the robotics and cyber security, are being an important role in robotics world. This paper addresses technological implications of security enha...

2010
Gurdas Singh Janpreet Singh Sukhjit Singh Sehra Mohanjeet Singh Inderjit Singh

Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor node requires communicating among each other or with base stat...

2008
Mircea Puta

As an important application of chaotic dynamical systems, chaos-based secure communication and cryptography attracted continuous interest over the last decade. It studies methods of controlling deterministic systems with chaotic behavior. Moreover, it is easy to notice the possibility of substantial variation of the characteristics of chaotic systems by relatively small variations of their para...

2004
Gonzalo Álvarez Shujun Li

In recent years, chaotic attractors have been extensively used in the design of secure communication systems. One of the preferred ways of transmitting the information signal is binary chaotic modulation, in which a binary message modulates a parameter of the chaotic generator. This paper presents a method of attack based on estimating the short-time period of the ciphertext generated from the ...

2003
Binoy George K. J. McGreggor

This paper provides a brief overview of wireless (WiFi) networks and some of the security measures in place today. We further seek to find a secure way to authenticate and enable secure communication between wireless (WiFi) clients and external networks.

2013
Wenxiang Zhang Zhanji Gui Kaihua Wang

Chaotic synchronization is the key technology of secure communication. In this paper, an impulsive control method for chaotic synchronization of two coupled Lorenz chaotic system was proposed. The global asymptotic synchronization of two Lorenz systems was realized by using the linear error feedback of the state variables of the drive system and the response system as impulsive control signal. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید