نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

Journal: :IEEE communications standards magazine 2021

The popularity of drones has increased their deployment in a wide range applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. facility fast cost effectiveness make potential choice for an aerial base station to serve user equipments (UEs) defined area. Drones are equipped with night vision cameras, advanced sensors, GPS receivers, which them able capt...

2010
Rupak Kharel Krishna Busawon Z. Ghassemlooy

In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal generated is shown to resist popular attack metho...

2008
J. Ott E. Carrara

An RTP profile (SAVP) for secure real-time communications and another profile (AVPF) to provide timely feedback from the receivers to a sender are defined in RFC 3711 and RFC 4585, respectively. This memo specifies the combination of both profiles to enable secure RTP communications with feedback. Ott & Carrara Standards Track [Page 1] RFC 5124 February 2008 Table of

2001
Raymund Eisele

(i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certificat...

Journal: :RFC 2008
Jörg Ott Elisabetta Carrara

An RTP profile (SAVP) for secure real-time communications and another profile (AVPF) to provide timely feedback from the receivers to a sender are defined in RFC 3711 and RFC 4585, respectively. This memo specifies the combination of both profiles to enable secure RTP communications with feedback. Ott & Carrara Standards Track [Page 1] RFC 5124 February 2008 Table of

2007
Lifeng Lai Praveen Kumar Hesham El Gamal

In this work, we present new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, we consider the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on the available channel state information. We t...

Journal: :IEEE Computer 2001
Peter Bergstrom Kevin Driscoll John Kimball

L ong the futuristic domain of hobbyists, home automation is now moving from the bleeding edge to the mainstream. Utility service providers offer specialized and valuable applications such as energy load management to retain customers in the face of competition. More new homes are wired for intelligent control, with security, comfort, and convenience systems becoming networkaware. Homeowners ca...

1999
Maryline Laurent-Maknavicius Ahmed Bouabdallah Christophe Delahaye Herbert Leitold Reinhard Posch Enrique Areizaga Juàn Manuel Mateos

The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) networks by offering data confidentiality, partners authentication, etc. This paper describes the architecture of one of the first ATM Forum compliant security prototypes being currently developed in the European project...

Journal: :Int. Journal of Network Management 2001
Wen-Her Yang Shiuh-Pyng Shieh

-Many key establishment protocols have been proposed for secure group communications. However, these protocols share the limitations that group members are not mutually authenticated, dynamic group membership is not considered, and the cost of key establishment is substantial. A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید