نتایج جستجو برای: secure communication

تعداد نتایج: 391555  

2007
Peter M. Oelschlaeger

OF THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science Electrical Engineering The University of New Mexico Albuquerque, New Mexico

2010
Sandip Dutta Soubhik Chakraborty

Security has become an important topic for communication systems. It is a big challenge to provide secure communication in this unique network environment. We propose a novel approach to encrypt a message using musical notes and these musical notes have to be sent by the sender to the receiver. The receiver after receiving the musical notes decrypts it and gets back the original message.

2017
Michael Eonsuk Shin Hassan Gomaa Don Pathirage

This paper describes the integration of security and communication patterns in reusable secure connectors that are incorporated in the model-based design of secure distributed component-based software architectures. The secure connectors are designed separately from application components by reusing the appropriate communication pattern between components as well as the security patterns requir...

2003
G. Álvarez F. Montoya M. Romera G. Pastor

This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.

2002
Junan Lu Xiaoqun Wu Jinhu Lü

This Letter further investigates the synchronization of a unified chaotic system via different methods. Several sufficient theorems for the synchronization of the unified chaotic system are deduced. A scheme of secure communication based on the synchronization of the unified chaotic system is presented. Numerical simulation shows its feasibility.  2002 Elsevier Science B.V. All rights reserved.

2003
TAO YANG

Secure communication using synchronization between chaotic systems(chaotic secure communication, for short) is a new concept of secure communication. The great potentials of this kind of “hardware key” secure communication systems had driven the progress of this field rapidly. Since 1992, chaotic secure communication had evolved four generations. In this paper, a detailed history of chaotic sec...

2003
Kaliappan Gopalan

A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the recei...

2015
Snigdha Soni Sandeep Pratap Singh Sanjay Sharma Harshvardhan Tiwari Marc Stevens X. Wang H. Yu Y. L. Yin Florent Chabaud Antoine Joux Ricardo Chaves Georgi Kuzmanov Leonel Sousa

In today's world every person relies on internet for various purposes. There is always a need to take appropriate measures for getting secure communication all the way throughout this unsecure internet. Integrity is one of the most significant factors in the communication scenario. There are various algorithms that ensure the integrity but almost all are either not secure or not efficient....

2009
Sunghyuck Hong

Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید