نتایج جستجو برای: security communication

تعداد نتایج: 505280  

2017
Fabian van den Broek Erik Poll Bárbara Vieira

We consider the functional and security requirements for the information exchanges in the infrastructure for EV charging being trialled in the Netherlands, which includes support for congestion management using the smart charging protocol OSCP. We note that current solutions do not provide true end-to-end security, even if all communication links are secured (for instance with TLS), as some dat...

Journal: :EURASIP J. Wireless Comm. and Networking 2013
Muthumanickam Gunasekaran Kandhasamy Premalatha

Fourth-generation wireless networks may require an integration of mobile ad hoc networks (MANET) into external network to enhance the flexibility of the communication and roaming. This phenomenon is well-suited for commercial and military applications which yield additional benefit of roaming. However, integration of MANET with external network poses a serious security challenge for communicati...

2017
Jaya Bharti Jyotsna Sagar

The current world of digital communication secure data communication prime task. This paper discusses a new modified method for provide the security of the information in the unsecure communication channel. In this proposed paper implement a GF theory on digital data. In this thesis explore a variety of applications of the theory and applications of arithmetic and computation in the finished fi...

2016
Rajesh K. Sharma

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...

2017
Song Feng Lu Haider Ali Mohammed Omer Farooq

Any web security system should achieve three conceptual goals are; confidentiality, integrity and Non-repudiation, and authentication. Also any system of communication when it is designed with these security services are taken into account and these security services must be defined and can be shortened format as (CIA).In this paper, we are going to discuss the theoretical background on the obj...

2011
Abdullah Sharaf Alghamdi Tazar Hussain Gul Faraz Khan Khalid Alnafjan Abdul Haseeb

Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead...

2011
Vishal Rathod Mrudang Mehta

Wireless Sensor Network is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance future. The inclusion of wireless communication technology also incurs various types of security threats. However, lik...

Journal: :IET Information Security 2010
Pitipatana Sakarindr Nirwan Ansari

Secure group communication (SGC) has attracted much attention, as group-oriented communications have been increasingly facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Of all proposals reported, most have focused on addressing the issue of key management to SGC systems. The authors, however, advocate that security services ar...

ژورنال: حیات 2016
دبیری‌فرد, اعظم, دبیری‌فرد, مریم, سلمانی, نیر, مقصودی, زهرا, کارجو, زهره,

Background & Aim: Nowadays in the NICU, family-centered care is the foundation of care, and communication is at the core of family-centered care. This study aimed to compare the perceptions of nurse-mother communication between neonatal intensive care nurses and mothers of hospitalized neonates. Methods & Materials: This is a cross-sectional study. 70 mothers of hospitalized newborns and 70 ...

Journal: :international journal of information, security and systems management 2012
amir ashkan nasiripour somayeh hamzeh sina golesorkhi

background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید