نتایج جستجو برای: security communication
تعداد نتایج: 505280 فیلتر نتایج به سال:
We consider the functional and security requirements for the information exchanges in the infrastructure for EV charging being trialled in the Netherlands, which includes support for congestion management using the smart charging protocol OSCP. We note that current solutions do not provide true end-to-end security, even if all communication links are secured (for instance with TLS), as some dat...
Fourth-generation wireless networks may require an integration of mobile ad hoc networks (MANET) into external network to enhance the flexibility of the communication and roaming. This phenomenon is well-suited for commercial and military applications which yield additional benefit of roaming. However, integration of MANET with external network poses a serious security challenge for communicati...
The current world of digital communication secure data communication prime task. This paper discusses a new modified method for provide the security of the information in the unsecure communication channel. In this proposed paper implement a GF theory on digital data. In this thesis explore a variety of applications of the theory and applications of arithmetic and computation in the finished fi...
This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...
Any web security system should achieve three conceptual goals are; confidentiality, integrity and Non-repudiation, and authentication. Also any system of communication when it is designed with these security services are taken into account and these security services must be defined and can be shortened format as (CIA).In this paper, we are going to discuss the theoretical background on the obj...
Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead...
Wireless Sensor Network is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance future. The inclusion of wireless communication technology also incurs various types of security threats. However, lik...
Secure group communication (SGC) has attracted much attention, as group-oriented communications have been increasingly facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Of all proposals reported, most have focused on addressing the issue of key management to SGC systems. The authors, however, advocate that security services ar...
Background & Aim: Nowadays in the NICU, family-centered care is the foundation of care, and communication is at the core of family-centered care. This study aimed to compare the perceptions of nurse-mother communication between neonatal intensive care nurses and mothers of hospitalized neonates. Methods & Materials: This is a cross-sectional study. 70 mothers of hospitalized newborns and 70 ...
background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید