نتایج جستجو برای: secure communication
تعداد نتایج: 391555 فیلتر نتایج به سال:
INTRODUCTION ......................................................................................... 2 I. THE LARGE IMMORTAL MACHINE ................................................. 8 A. The Conversion to Electronic Switching ................................ 9 B. Signaling Systems 6 and 7 .................................................... 10 C. Separating Control Data from Content ...........
Secure communication is a critical and challenging issue in wireless networks. To achieve the information theoretic secrecy the leading approach is artificial noisy symbol. The basic idea in this paper is enhancing the security in wireless communication. Multiple Inter-symbol Obfuscation(MIO) method will be deployed in the physical layer. MIO is a method for transferring the data and it provide...
Privacy technologies have become extremely prevalent in recent years from secure communication channels to the Tor network. These technologies were designed to provide privacy and security for users, but these ideals have also led to increased criminal use of the technologies. Privacy and anonymity are always sought after by criminals, making these technologies the perfect vehicles for committi...
We consider the problem of secure communication in a network with malicious (Byzantine) faults for which the trust graph, with vertices the processors and edges corresponding to certiied public keys, is not known except possibly to the adversary. This scenario occurs in several models. For example, in survivability models in which certifying authorities may be corrupted, or in networks which ar...
Groupware applications require secure communication and group-management services. Participants in such applications may have divergent interests and may not fully trust each other. The services provided must then be designed to tolerate possibly misbehaving participants. Enclaves is a software framework for building such group applications. We discuss how the protocols used by Enclaves can be ...
Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while steganalysis is the detection of steganography. Steganography means “covered writing” that hides the existence of the message itself. Digital steganography provides potential for private and secure communication that has become the necess...
In this paper, we will introduce a new kind of server, called the Smart Data Server (SDS). It acts as the middle-tier in a three-tier architecture (Applet-SDS-Database). It allows the building of lean clients by shifting functionality to the SDS. It offers a frame for easy-to-build environment-independent modules with multiple functionality. By building of SDS-networks, secure communication is ...
Ultra Wide Band (UWB) signalling is expected to play an important role in the future of communications systems. UWB uses extremely wide transmission bandwidths (in excess of 3 GHz), which results in desirable potentials such as accurate position location and ranging, lack of significant fading, high multiple access capability, secure communications, and possible easier material penetration. The...
Security protocols must be designed to ensure the integrity of electronic communications between participants. Although the design of secure communication protocols has improved over the years the tasks of building and validating these protocols remain inherently difficult. Security protocols may fail due to unintended use, malicious attacks, incorrect logic or incorrect transition from design ...
We review the imperatives on the optical communication technology industry to realize universal ultra high speed access to the world‟s information. OCIS codes: (060.2330) Fiber optics communications; (060.4250) Networks
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید