نتایج جستجو برای: security communication

تعداد نتایج: 505280  

Journal: :Telecommunication Systems 2000
Chern-Tang Lin Shiuh-Pyng Shieh

Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to sup...

Journal: :JCS 2014
Aamir Shahzad Shahrulniza Musa Abdulaziz Aborujilah Muhammad Irfan

The SCADA system connectivity with several open networks using internet facility brought SCADA platform more vulnerable from attacks/threads. Therefore, the detail security review has been conducted, to find the potential security issues which are residing and warming the SCADA communication and also existing potential security solutions that are used to protect the SCADA communication. However...

1993
Pierre Bieber Nora Cuppens-Boulahia T. Lehmann E. van Wickeren

We use an existing formal software developement method called B in order to build and verify specica-tions of a communication channel, cryptographic functions and security properties. We show on an example how these basic specications may be combined in order to write abstract specications of cryptographic protocols and to verify their security. 1 Introduction Security evaluation criteria recom...

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

2008
Arindam Mitra

The long-standing problem of quantum information processing is to remove the classical channel from quantum communication. Introducing a new information processing technique, it is discussed that both insecure and secure quantum communications are possible without the requirement of classical channel. Quantum cryptography [1-7] and teleportation [8] are the two important aspects of quantum comm...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2000
W K Panofsky

I science facing a new environment triggered by the alleged successful espionage by foreign parties, in particular China, aimed at the nation’s nuclear weapons secrets? Several much publicized reports, in particular that of the Cox Commission of the Congress†, the Rudman report by the President’s Foreign Intelligence Advisory Board, and the review of the findings of the intelligence community, ...

2010
Utku KOSE

In today’s world, information security is an essential factor, which must be taken into consider to ensure secure applications and services in information technology. Since the inception of the information technology concept, there has been a remarkable interest in security approaches that aim to protect information or digital data. Especially, rise of the Internet and internet technologies has...

1990
Donald Beaver Joan Feigenbaum Joe Kilian Phillip Rogaway

We consider the communication complexity of secure multiparty computations by networks of processors each with unlimited computing power. Say that an n-party protocol for a function of m bits is efficient if it uses a constant number of rounds of communication and a total number of message bits that is polynomial in max(m, n). We show that any function has an efficient protocol that achieves (r...

2007
Jari-Pekka Korjus

Mobile computing has become very important and popular in networking. And it will certainly become even more popular because of the beneets it can ooer. But mobility also raises some important security issues and even vulnerabilities. This paper lists the most signiicant security constraints and threats that the mobile communication systems have.

1999
Sheng-Bo Xu Cees Jansen Henk C. A. van Tilborg

With the global deployment of portable communication systems and the ongoing developments in this area, one expects more and more sophisticated security features to be provided such as entity authentication, robust user identity confidentiality and non-repudiation services. Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید