نتایج جستجو برای: security communication

تعداد نتایج: 505280  

Journal: :CoRR 2014
Yessica Saez Xiaolin Cao Laszlo B. Kish G. Pesti

We review the security requirements for a vehicle communication network. We also provide a critical assessment of the security communication architectures and perform an analysis of the keys to design an efficient and secure vehicular network. We propose a novel unconditionally secure vehicular communication architecture that utilizes the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme.

Journal: :IJIRR 2016
Amine Boudia Reda Mohamed Hamou Abdelmalek Amine

37 Security Impact on e-ATM Windows Communication Foundation Services using Certificate based Authentication and Protection: An implementation of Message Level Security based on .NET Technique; Subhash Medhi, Loktak Power Station, National Hydro Electric Power Corporation Ltd., Loktak, India Abhijit Bora, Department of Electronics & Communication Technology, Gauhati University, Guwahati, India ...

Journal: :Comput. Sci. Inf. Syst. 2009
Ioannis V. Koskosas

A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups i...

Journal: :JMIR medical informatics 2015
Micah T Prochaska Amber-Nicole Bird Amar Chadaga Vineet M Arora

BACKGROUND Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. OBJECTIVE We sought to compare residents' preferences for SMS text messaging compared with ...

1999
John Zao Alden Jackson David Mankins

Abstract. As security devices and protocols become widely used on the Internet, the task of managing and processing communication security policies grows steeply in its complexity. This paper presents a scaleable, robust, secure distributed system that can manage communication security policies associated with multiple network domains and resolving the policies — esp. those that specify the use...

The purpose of this study was to identifying the challenges and opportunities of organizational development in the oil industry through technology. This research was from a type qualitative research. The statistical population of the study included managers and employees in the oil industry. Semi-structured interviews were conducted using targeted snowball sampling method, 13 managers and emplo...

1992
Gene Tsudik Els Van Herreweghen Stefano Zatti

This paper describes KryptoKnight, an authentication and key distribution system that provides facilities for secure communication in any type of network environment. KryptoKnight was designed with the goal of providing network security services with a high degree of com-pactness and exibility. Message compactness of KryptoKnight's protocols allows it to secure communication protocols at any la...

1992
Refik Molva Gene Tsudik Els Van Herreweghen Stefano Zatti

This paper describes KryptoKnight, an authentication and key distribution system that provides facilities for secure communication in any type of network environment. KryptoKnight was designed with the goal of providing network security services with a high degree of compactness and exibility. Message compactness of KryptoKnight's protocols allows it to secure communication protocols at any lay...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید