نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

Journal: :Proceedings on Privacy Enhancing Technologies 2023

IoT devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring network traffic. Recent research works have shown that a trained machine learning (ML) model can accurately fingerprint learned from (encrypted) traffic flows of devices. Such fingerprinting attacks are capable revealing make and devices, which further...

2002
John Viega Matt Messier Pravir Chandra

network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find the book here. Never worry not to find what you need. Is the network security with openssl cryptography for secure communications your needed book now? That's true; you are really a good reader. This is a perfect book that comes from great author to share with you. The book ...

Journal: :CoRR 2003
Liam Wagner

Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...

2003
Liam Wagner

Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...

2000
Jeremy T. Bradley

Information is now the most valuable resource in the world. Whether it is a personal letter or an industrial secret, all information has a worth to someone. This thesis considers issues of security and privacy for such information. It discusses the reasons for wishing to protect data and the methods available for doing so. Specifically, the project concerns cryptography and secure communication...

2008
Alain Beaulieu Greg Phillips Sandra Smith

Security protocols must be designed to ensure the integrity of electronic communications between participants. Although the design of secure communication protocols has improved over the years the tasks of building and validating these protocols remain inherently difficult. Security protocols may fail due to unintended use, malicious attacks, incorrect logic or incorrect transition from design ...

2014
Chien-Hsing Liao Tai-Kuo Woo

Communication systems have to be made secure against unauthorized interception or against disruption or corruption in complicated electromagnetic environments. There are mainly three security categories used to delineate wireless communication systems generally, such as shown in Fig. 1, i.e., INFOSEC, COMSEC, and TRANSEC. We state about information security (INFOSEC) as that trying to against u...

2007
Dorothy E. Denning

The growth of telecommunications and electronic commerce has led to a growing commercial market for digital encryption technologies. Business needs encryption to protect intellectual property and to establish secure links with their partners, suppliers, and customers. Banks need it to ensure the confidentiality and authenticity of financial transactions. Law enforcement needs it to stop those u...

Journal: :Journal of Systems and Software 2003
Feng W. Zhu Matt W. Mutka Lionel M. Ni

Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficien...

2012
Florim IDRIZI Ilia NINKA

Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data access and protect information on the internet and ultimately boost consumer confidence. By implementing encryption, integrity is maintained while digital authentic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید