نتایج جستجو برای: security communication

تعداد نتایج: 505280  

2017
Joan Daemen Vincent Rijmen Douglas Selent

Turbo codes enable reliable communication over power-constrained communication channels at close to Shannon's limit. Further, the performance of the communication system is enhanced by incorporating security mechanism. Security is described as the process of minimizing the vulnerabilities of assets or resources. National Institute of Standards and Technology (NIST) chose Rijndael algorithm...

2015
Antti Evesti Jani Suomalainen Reijo Savola

Short-range wireless communication applications have become common nowadays. Healthcare systems based on them hold a remarkable promise for the costly treatment of chronic diseases. Healthcare applications utilize various wireless communication technologies in order to achieve a good connectivity, which is essential in ubiquitous computing. Weak security in wireless networks may ruin the securi...

2011
Stein R Bolle Per Hasvold Eva Henriksen

BACKGROUND Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. METHODS Information security was assessed for risk, based on the inform...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2007
Lijun Liao Jörg Schwenk

This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and pr...

2002
Sasha Slijepcevic Miodrag Potkonjak Vlasios Tsiatsis Scott Zimbeck Mani B. Srivastava

s of wireless microsensors for monitoring vironments have emerged as an important new area for the wireless technology. Key f these new types of networked systems are the nstrained computational and energy resources, hoc operational environment. This paper is a he communication security aspects of these Resource limitations and specific architecture networks call for customized security s. Our ...

1999
JORIS CLAESSENS BART PRENEEL JOOS VANDEWALLE

Although electronic commerce is a relatively new concept, it has already become a normal aspect of our daily life. The software agent technology is also relatively new. In the area of electronic commerce, software agents could be used for example to search the lowest prices and the best services, to buy goods on behalf of a user, etc. These applications involve a number of security issues that ...

2003
Florian-Daniel Otel Jean-Yves Le Boudec

Some of the known results for delivering deterministic bounds on endto-end queuing delay in networks with constant packet sizes and constant link rates rely on the concept of Route Interference. Namely, it is required to know the number of ows joining on any output link in the whole network. In this paper we extend the existing results for the more generic cases of connection-oriented networks ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید