نتایج جستجو برای: secure communications
تعداد نتایج: 133581 فیلتر نتایج به سال:
The popularity of drones has increased their deployment in a wide range applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. facility fast cost effectiveness make potential choice for an aerial base station to serve user equipments (UEs) defined area. Drones are equipped with night vision cameras, advanced sensors, GPS receivers, which them able capt...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal generated is shown to resist popular attack metho...
An RTP profile (SAVP) for secure real-time communications and another profile (AVPF) to provide timely feedback from the receivers to a sender are defined in RFC 3711 and RFC 4585, respectively. This memo specifies the combination of both profiles to enable secure RTP communications with feedback. Ott & Carrara Standards Track [Page 1] RFC 5124 February 2008 Table of
(i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certificat...
An RTP profile (SAVP) for secure real-time communications and another profile (AVPF) to provide timely feedback from the receivers to a sender are defined in RFC 3711 and RFC 4585, respectively. This memo specifies the combination of both profiles to enable secure RTP communications with feedback. Ott & Carrara Standards Track [Page 1] RFC 5124 February 2008 Table of
In this work, we present new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, we consider the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on the available channel state information. We t...
L ong the futuristic domain of hobbyists, home automation is now moving from the bleeding edge to the mainstream. Utility service providers offer specialized and valuable applications such as energy load management to retain customers in the face of competition. More new homes are wired for intelligent control, with security, comfort, and convenience systems becoming networkaware. Homeowners ca...
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) networks by offering data confidentiality, partners authentication, etc. This paper describes the architecture of one of the first ATM Forum compliant security prototypes being currently developed in the European project...
-Many key establishment protocols have been proposed for secure group communications. However, these protocols share the limitations that group members are not mutually authenticated, dynamic group membership is not considered, and the cost of key establishment is substantial. A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of g...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید