نتایج جستجو برای: secure communication

تعداد نتایج: 391555  

2005
Kihong Kim Jinkeun Hong Jongin Lim

There are important performance issues in secure wireless networks, such as mobility, power, bandwidth, and bit error rate (BER), that must be considered when designing a communication resume protocol. The efficiency of a secure session resume for a fast resume of secure communication is a key point in secure connection development. In this paper, a fast secure communication resume protocol usi...

2006
Marko Wolf André Weimerskirch Christof Paar

This work presents a study of state of the art bus systems with respect to their security against various malicious attacks. After a brief description of the most well-known and established vehicular communication systems, we present feasible attacks and potential exposures for these automotive networks. We also provide an approach for secured automotive communication based on modern cryptograp...

2008
C. Mathiazhagan

A simple technique for decoding an unknown modulated chaotic time-series is presented. We point out that, by fitting a polynomial model to the modulated chaotic signal, the error in the fit gives sufficient information to decode the modulating signal. For analog implementation, a lowpass filter can be used for fitting. This method is simple and easy to implement in hardware. Indexing terms: cha...

Journal: :CoRR 2016
Parthajit Mohapatra Chandra R. Murthy Jemin Lee

In this work, the role of unidirectional limited rate transmitter cooperation is studied in the case of the 2user Z interference channel (Z-IC) with secrecy constraints at the receivers, on achieving two conflicting goals simultaneously: mitigating interference and ensuring secrecy. First, the problem is studied under the linear deterministic model. The achievable schemes for the deterministic ...

Journal: :IEEE Trans. Information Theory 2003
Alfred O. Hero

Network security is important for information protection in open, secure or covert communications. One such requirement is to achieve high rate communications between clients. e.g. terminals or sensors, in the network while hiding information about the transmitted symbols, signal activity, or other sensitive data from an unintended receiver, e.g. an eavesdropper. For wireless links the single u...

1998
Patrick McDaniel Peter Honeyman Atul Prakash

An advantage of today’s high speed networks is the ability to support group communication. Applications that support group communication allow the free exchange of ideas and data in real time, regardless of the physical distance between the participants. Unfortunately, support for additional protocol features such as reliability, secrecy, and total ordering in the multicast context requires mor...

Journal: :CoRR 2005
Saied Hosseini-Khayat Iman Marvian

A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice’s qubit source is perfect in the sense that it does not ina...

Journal: :Science China Physics, Mechanics & Astronomy 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید