نتایج جستجو برای: security communication
تعداد نتایج: 505280 فیلتر نتایج به سال:
Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources, and an ad hoc operational environment. This paper is a study of the communication security aspects of these networks. Resource limi...
The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consider the FIPA agent communication specifications from a security perspective, and outline how security functionality can be added. Keywords— security, multi-agent system, communication, FIPA.
In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
Secure electronic communication relies on cryptography. Even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, etc. We are now seeing proliferation of large secure environments characterized by high volume, encrypted traffic between principals, facilitated by Public Key Infrastructures (PKI). PKIs are dependent on se...
Among civilian communication systems, vehicular networks emerge as one of the most convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. Thanks to the substantial research efforts carried out by the community so far, ...
In 2009, Chen et al. proposed a satellite communication system for mobile devices to achieve wide communication. In this scheme, there are some security loopholes that need to be fixed since the mobile device was stolen. Since a malicious attacker intercepts the mobile user’s information they can proceed with different attacks. Hence, we propose a novel scheme to improve the mobile user’s commu...
Nowadays, using Information and Communication Technology (ICT) in health care with the aim of creating tools for diagnosing and treating diseases has proposed a new debate on the code of ethics. The raised ethical issues are beyond privacy and security, and have been the most important sources of debate and ethical questions in these professions.
Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید