نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

Journal: :IEEE Transactions on Vehicular Technology 2022

Unmanned aerial vehicles (UAVs) are foreseen to constitute promising airborne communication devices as a benefit of their superior channel quality. But UAV-to-ground (U2G) communications vulnerable eavesdropping. Hence, we conceive sophisticated physical layer security solution for improving the secrecy rate multi-antenna aided U2G systems. Explicitly, MIMO wiretap channels is derived by using ...

Journal: :Optics express 2018
Brian C. Grubel Bryan T. Bosworth Michael R. Kossey A. Brinton Cooper Mark A. Foster Amy C. Foster

We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities. Compared to a large, electronically stored one-time pad, our method provisions large amounts of information within the intrinsically complex nanostructure of the micro-cavities. By probing a micro-cavity wit...

Journal: :Wireless Communications and Mobile Computing 2016
Chengzhe Lai Rongxing Lu Hui Li Dong Zheng Xuemin Shen

With a great variety of potential applications, machine-type communications (MTC) is gaining a tremendous interest from mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating machine-to-machine communications. In the latest standard, 3GPP proposes a novel architecture for ...

Journal: :Knowl.-Based Syst. 2007
Bo Yuan

As knowledge based systems become more sophisticated, communications between systems or among their subsystems often conducted over public channels such as the Internet, wireless medium, etc. To secure communications over public channels, the most often used method is Diffie and Hellman’s public key infrastructure approach. This method requires a trusted third party to verify identifies, which ...

2003
Gonzalo Álvarez Shujun Li

In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as implementation details, or key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید