نتایج جستجو برای: security communication

تعداد نتایج: 505280  

2002

Every communication system requiring security properties is certainly critical. In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques of communication protocols to the analysis of cryptographic ones. We have extended the design and analysis phases with security properties. Our methodology uses a specificati...

2003
Petr Novák Milan Rollo Jirí Hodík Tomás Vlcek

Both, research and application development in the area of multi-agent systems currently undertakes rapid expansion. In order to use multi-agent technology in real applications, it is inevitable to ensure security, integrity and authenticity of inter-agent communication. Various securitysystems, developed for different applications have been used in multi-agent system (MAS). Alternatively, MAS a...

Journal: :I. J. Network Security 2011
Mohamed Salah Bouassida

Security and protection of private user information are a prerequisite for the deployment of the vehicular network technologies. Nevertheless, the establishment of a secure communication architecture within vehicular ad hoc networks address special challenges, due to the characteristic and specificities of such environment (high dynamic and mobility of nodes, high rate of topology changes, high...

2015
Basant Kuamr Verma Binod Kumar

wireless communication is easy to use, rapid implementable and low cost communication technique as compared to the traditional wired communication.Therefore a number of different applications are consumes the wireless communication technology. In wireless ad hoc technology the networks are supporting the mobility and ad hoc configuration of topology development. Therefore the on demand nature o...

Journal: :CoRR 2013
Biao He Xiangyun Zhou Thushara D. Abhayapala

Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration. This paper provides a survey of recent research and developm...

Journal: :Computers & Security 2008
Vassilios Stathopoulos Panayiotis Kotzanikolaou Emmanouil Magkos

In this paper we examine logging security in the environment of electronic communication providers. We review existing security threat models for system logging and we extend these to a new security model especially suited for communication network providers, which also considers internal modification attacks. We also propose a framework for secure log management in public communication network...

1998
Muhammad Rabi Tim Finin Alan Sherman Yannis Labrou

Despite the security and privacy concerns that agents could encounter whenever they cross multiple administrative domains, the agent communication languages standards lack the necessary constructs that enables the secure cooperation among software agents. We propose Secure Knowledge Query Manipulation Language (SKQML) as a security infrastructure for KQMLspeaking agents. SKQML enables KQML-spea...

2002
Javier Lopez Juan J. Ortega José M. Troya

Every communication system requiring security properties is certainly critical. In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques of communication protocols to the analysis of cryptographic ones. We have extended the design and analysis phases with security properties. Our methodology uses a specificati...

2017
Sumithra Alagarsamy S. P. Rajagopalan

The rapid progress in the internet requires multiple message communication over the wider area to improve the mobile network security. Due to the multiple message communication, the security is a most important concern in mobile network. The bilinear Certificate less Aggregate Signcryption Scheme guarantees the security under several attacks, and therefore provides security and non-repudiation....

Journal: :IACR Cryptology ePrint Archive 2017
Paul Rösler Christian Mainka Jörg Schwenk

Secure Instant Messaging (SIM) is utilized in two variants: one-to-one communication and group communication. While the first variant has received much attention lately (Frosch et al., EuroS&P16; Cohn-Gordon et al., EuroS&P17; Kobeissi et al., EuroS&P17), little is known about the cryptographic mechanisms and security guarantees of SIM group communication. In this paper, we investigate group co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید