نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2017
Michael Eonsuk Shin Don Pathirage

This paper describes security failure-tolerant requirements, which tolerate the failures of security services that protect applications from security attacks. A security service, such as authentication, confidentiality or integrity security service, can be always broken down as advanced attack skills are coined. There is no security service that is forever secure. This paper describes an approa...

Journal: :JIPS 2016
Jeong Kyu Lee Seo Yeon Moon Jong Hyuk Park

As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like “improving the” or “figuring out how to use the” future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Intern...

2000
Zhi Fu He Huang Tsung-Li Wu Shyhtsun Felix Wu Fengmin Gong Chong Xu Ilia Baldine

This research is supported by the U.S. Department of Defense Advanced Research Projects Agency under contract DABT63-97-C-0045. Abstract Many security mechanisms and protocols have been developed to handle security problems in various circumstances. This trend has created a heterogeneous security environment for today's global Internet. Although most of security functions and modules can be man...

Journal: :JNW 2014
Wei Wang Hao Huang Changsheng Xie Lin Han

Because of the features of pseudo randomness, noise-like behaviour, and the sensitivity of initial values and control parameters, chaotic mapping has widely been applied in the field of security telecommunication and video/image encryption. Additionally, in the past few decades the technology of chaotic mapping in security applications has made great progress, yet it has not become popular for ...

2008
Mariana Hentea

Executive Summary The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emerge...

2004
Reda Reda

This paper reports the findings of recent studies on the impact of intelligence in modern/future-oriented telecom networks. The ICT/ telecommunication market evolution and future trends are presented. Subsequently, the business opportunities are also discussed. The main drivers for the evolution as well as market success are mobility, security, and intelligence in the network. Though the global...

2004
Torsten Priebe Björn Muschall Wolfgang Dobmeier Günther Pernul

Web-based systems like enterprise and e-government portals pose special requirements to information security. Today’s portal platforms provide some security functionality, mainly targeting at supporting a single-sign-on for the underlying applications. We argue that singlesign-on is not sufficient, but rather a mature security service is needed as a central authorization instance. As access con...

2012
H. Tschofenig

OpenID has found its usage on the Internet for Web Single Sign-On. Simple Authentication and Security Layer (SASL) and the Generic Security Service Application Program Interface (GSS-API) are application frameworks to generalize authentication. This memo specifies a SASL and GSS-API mechanism for OpenID that allows the integration of existing OpenID Identity Providers with applications using SA...

2006
Heiko Rossnagel Tobias Scherner

Disaster management using mobile telecommunication networks provides a new and attractive possibility to save human lives in emergencies. With this contribution, we present a possible disaster management system based on mobile telecommunication. In order to use such a system in the real world, security requirements such as availability, accountability, integrity and confidentiality have to be e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید