نتایج جستجو برای: secure communications
تعداد نتایج: 133581 فیلتر نتایج به سال:
IoT devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring network traffic. Recent research works have shown that a trained machine learning (ML) model can accurately fingerprint learned from (encrypted) traffic flows of devices. Such fingerprinting attacks are capable revealing make and devices, which further...
network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find the book here. Never worry not to find what you need. Is the network security with openssl cryptography for secure communications your needed book now? That's true; you are really a good reader. This is a perfect book that comes from great author to share with you. The book ...
Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...
Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...
Information is now the most valuable resource in the world. Whether it is a personal letter or an industrial secret, all information has a worth to someone. This thesis considers issues of security and privacy for such information. It discusses the reasons for wishing to protect data and the methods available for doing so. Specifically, the project concerns cryptography and secure communication...
Security protocols must be designed to ensure the integrity of electronic communications between participants. Although the design of secure communication protocols has improved over the years the tasks of building and validating these protocols remain inherently difficult. Security protocols may fail due to unintended use, malicious attacks, incorrect logic or incorrect transition from design ...
Communication systems have to be made secure against unauthorized interception or against disruption or corruption in complicated electromagnetic environments. There are mainly three security categories used to delineate wireless communication systems generally, such as shown in Fig. 1, i.e., INFOSEC, COMSEC, and TRANSEC. We state about information security (INFOSEC) as that trying to against u...
The growth of telecommunications and electronic commerce has led to a growing commercial market for digital encryption technologies. Business needs encryption to protect intellectual property and to establish secure links with their partners, suppliers, and customers. Banks need it to ensure the confidentiality and authenticity of financial transactions. Law enforcement needs it to stop those u...
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficien...
Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data access and protect information on the internet and ultimately boost consumer confidence. By implementing encryption, integrity is maintained while digital authentic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید