نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

Journal: :Transactions on Emerging Telecommunications Technologies 2020

Journal: :IEEE Transactions on Wireless Communications 2021

In this paper, we study an intelligent reflecting surface (IRS)-aided wireless secure communication system for physical layer security, where IRS is deployed to adjust its elements guarantee of multiple legitimate users in the presence eavesdroppers. Aiming improve secrecy rate, a design problem jointly optimizing base station (BS)'s beamforming and IRS's formulated given different quality serv...

2003
Horace P. Yuen

The “impossibility proof” on unconditionally secure quantum bit commitment is critically analyzed. Many possibilities for obtaining a secure bit commitment protocol are indicated, purely on the basis of two-way quantum communications, which are not covered by the impossibility proof formulation. They are classified under six new types of protocols, with security proofs for specific examples on ...

2007
Xiaoting Sun

I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. Xiaoting Sun I understand that my thesis may be made electronically available to the public. Abstract Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissem...

1998
Lynda L. McGhie

Large organizations must be able to communicate with external suppliers, partners, and customers. Implementation of bidirectional E-mail and file transfers, however, may pose a significant security threat to the organization's internal systems. This article describes a network architecture for securing external communications that has been successfully implemented at Lockheed Missiles and Space...

2006
Bharat T. Doshi

xperiences from recent wars against nations and global terrorism have identified a need for a much higher degree of information sharing and joint decision making among various intelligence agencies, different armed forces, and the central command and control structure. meeting this need calls for an orders-of-magnitude increase in computing and communications capacities and replacement of curre...

Journal: :IJITWE 2015
Christophe Guyeux Abdallah Makhoul Ibrahim Atoui Samar Tawbi Jacques M. Bahi

Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sens...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید