نتایج جستجو برای: secure communication

تعداد نتایج: 391555  

Journal: :مطالعات باستان شناسی 0
محمد اسماعیل اسمعیلی جلودار دانشجوی دانشگاه تهران جواد صفی نژاد دانشگاه تهران

abstract the contact between major settlements in the central plateau of iran, especially in desert areas, was not possible without having a secure communication system. in this regard, designing communication networks through constructing secure roads with halfway caravansarais in desert areas, usually without secure underground and surface water supply, needed special insights and provisions....

2003
Nut Taesombut Vineet Kumar Rishi Dubey P. Venkat Rangan

Wireless LANs based on the IEEE 802.11 technology are becoming increasingly prevalent. The availability of highbandwidth together with the convenience of being a wireless medium makes it a compelling technology for multimediabased applications. In this paper, we present a gatewaybased architecture of the wireless home media network and develop a secure registration protocol that is appropriate ...

Journal: :CoRR 2007
Ashish Khisti Gregory W. Wornell

The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and the channel matrices are fixed and known to all the terminals, and show that a beamforming strategy...

2010
Yan Sun Wade Trappe

This book gives an introduction to group key management protocols in different network settings. It can be recommended to early researchers in the areas of group key management, secure multicast and secure communication in sensor networks. The book discusses various security issues in group communications in a network-aware approach. However, it fails to show how to rigorously analyze group key...

Journal: :CoRR 2012
Yulong Shen Xiaohong Jiang Jianfeng Ma

Abstract—This work considers load-balance control among the relays under the secure transmission protocol via relay cooperation in two-hop wireless networks without the information of both eavesdropper channels and locations. The available two-hop secure transmission protocols in physical layer secrecy framework cannot provide a flexible load-balance control, which may significantly limit their...

Journal: :CoRR 2014
Mengfan Zheng Meixia Tao Wen Chen

In this paper, we propose a polar coding scheme for secure communication over the multiple-input, single-output, single-antenna eavesdropper (MISOSE) fading channel. We consider the case of block fading channels with known eavesdropper channel state information (CSI) and the case of fading channels with known eavesdropper channel distribution information (CDI). We use the artificial noise assis...

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

Journal: :Science China Information Sciences 2011

Journal: :Foundations of Physics 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید