نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
Many grid usage scenarios depend on small, dynamic working groups for which the ability to establish transient collaboration with little or no intervention from resource administrators is a key requirement. The system developed, PRIMA, focuses on the issues of management and enforcement of fine-grained privileges. Dynamic account creation and leasing as well as expressive enforcement mechanisms...
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have revolutionized programmable networks. Designers of networking applications i.e. Internet of things (IoT) have started investigating potentials of SDN paradigm in improving network management. IoT envision interconnecting various embedded d...
As Internet business exponentially grows, the need for high security level categories to identify groups of connections or individual transactions is manifest. The development of an efficient and secure communication protocol seems to be highly demanding. In this paper, we propose Adaptive Secure Protocol to support secure ecommerce transactions. Our Adaptive Secure Protocol dynamically adapts ...
In the context of wireless sensor networks, computation/communication tradeoffs may appear in many aspects of the system design. In this paper, we present a linear programming framework to guide designers in effectively using these tradeoffs for prolonging network lifetime. To investigate the tradeoff in more concrete terms, as our representative problem we choose a security service; non-repudi...
The telecommunication industry is the leading in big data trends as this has most capable infrastructure for data. However, adoption of services also raises important security and privacy challenges due to high volume, velocity, variety characteristics. To address issue, study shed light on industry. This focuses investigating users from lens TOE framework examines mitigation strategies challen...
and its Working Groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a "working draft" or "work in progres...
Wireless networks are susceptible to network attacks due to their inherent vulnerabilities. The radio signal used in wireless transmission can arbitrarily propagate through walls and windows; thus a wireless network perimeter is not exactly known. This leads them to be more vulnerable to attacks such as eavesdropping, message interception and modifications compared to wired-line networks. Secur...
Inter vehicular communication is a technology where vehicles act as different nodes to form a network. In a vehicular network different vehicles communicate among each other via wireless access .Authentication is very crucial security service for inter vehicular communication (IVC) in Vehicular Information Network. It is because, protecting vehicles from any attempt to cause damage (misuse) to ...
Generally, AES is typical encryption algorithm to support the security service of any mobile applications. However, AES cannot encrypt the short sensory data of partial block without data expansion, which is often in the mobile sensing application environments. In this paper, a word-based AES cipher, AESw, is proposed by modifying the AES to make it fit for encrypting the arbitrary message in 3...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید