نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2009
Georgios Kambourakis Constantinos Kolias Stefanos Gritzalis Jong Hyuk Park

The Universal Mobile Telecommunication Standard (UMTS) is the Third Generation (3G) mobile technology with the widest public acceptance. Although, enhanced in matters of security, comparing to its predecessor i.e., the GSM, it still has vulnerabilities that can lead to security breach. In this paper we investigate the vulnerabilities of the UMTS architecture that can be exploited by a malicious...

2008
Dimitris Geneiatakis Costas Lambrinoudakis

Internet Telephony services offer several new business opportunities to telecommunication providers. However, they also introduce several security flaws that can be exploited by various attacks, thus raising the need for the employment of suitable security measures during the provision of the service. Signaling attacks, a type of Denial of Service attacks, are an indicative example. In this pap...

2017
M. P. Gupta

Connectivity provided by telecommunication infrastructure provides a dominant platform and plays a vital role in realization of a smart city. Objective of this paper is to identify telecommunication indicators that will form the foundation and bridge the gap towards realization of smart cities in India. Smart Cities Council has broadly prepared the Smart Cities Framework which identifies variou...

2004
Eun-Ae Cho Young-Gab Kim Chang-Joo Moon Doo-Kwon Baik

SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerable burden to the CPU utilization so that performance and speed of the security service is lowered during encryption transaction. Second, SSL protocol can be vulnerable for cryptanalysis due to the fixed algorithm being used. Thi...

1998
Sang H. Son

Data management and transaction processing are essential in supporting advanced time-critical applications. In many of these applications, security is another important requirement. Security is especially critical in electronic commerce applications where databases often maintain and provide sensitive information. In electronic commerce, service providers are sensitive to the needs of the clien...

1996
J Wray

its Working Groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a "working draft" or "work in progress." ...

Journal: :J. Parallel Distrib. Comput. 2011
Mais Nijim Ziliang Zong Shu Yin Kiranmai Bellam Xiao Qin

In the past decade, parallel disk systems have been highly scalable and able to alleviate the problem of disk I/O bottleneck, thereby being widely used to support data-intensive applications. Although a variety of parallel disk systems were developed, most existing disk systems lack a means to adaptively control the quality of security for dynamically changing workloads. We address this gap in ...

Journal: :Information Technology and Management 2009
Praveen Paruchuri Jonathan P. Pearce Janusz Marecki Milind Tambe Fernando Ordóñez Sarit Kraus

We consider the problem of providing decision support to a patrolling or security service in an adversarial domain. The idea is to create patrols that can achieve a high level of coverage or reward while taking into account the presence of an adversary. We assume that the adversary can learn or observe the patrolling strategy and use this to its advantage. We follow two different approaches dep...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1386

از زمانی که انسان ها قادر به ارتباط با یکدیگر شدند، یک خواسته مهم امکان برقراری ارتباط سری بوده است. این خواسته به دلیل اهمیت و ارزش اطلاعات مبادله شده در یک ارتباط است. فراگیری فزاینده و رشد سریع استفاده از اینترنت به عنوان کانال انتقال اطلاعات، امروزه نیاز به امنیت ارتباطات را بیشتر از گذشته مطرح می کند. اگر چه استفاده از روش های رمزنگاری می تواند در برقراری یک ارتباط محرمانه کارامد باشد، اما...

Journal: :CoRR 2017
Salman M. Al-Shehri Pavel Loskot Tolga Numanoglu Mehmet Mert

The metrics play increasingly fundamental role in the design, development, deployment and operation of telecommunication systems. Despite their importance, the studies of metrics are usually limited to a narrow area or a well-defined objective. Our study aims to more broadly survey the metrics that are commonly used for analyzing, developing and managing telecommunication networks in order to f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید