نتایج جستجو برای: secure communications

تعداد نتایج: 133581  

2017
Jesús Lázaro Armando Astarloa José Angel Araujo Naiara Moreira Unai Bidarte Josep M. Guerrero

The smart-grid concept takes the communications from the enclosed and protected environment of a substation to the wider city or nationwide area. In this environment, cyber security takes a key role in order to secure the communications. The challenge is to be able to secure the grid without impacting the latency while, at the same time, maintaining compatibility with older devices and non secu...

2009
Ebrahim MolavianJazi

by Ebrahim MolavianJazi In this thesis, we consider a class of information protection problems requiring confidentiality (secrecy) from eavesdropping and integrity (reliability) from jamming in an information-theoretic context. For this purpose, we introduce the arbitrarily varying wire-tap channel (AVWTC) model consisting of a family of wiretap channels indexed by some state that is selected b...

2014
Tomislav Stankovski Peter V. E. McClintock Aneta Stefanovska

Secure encryption is an essential feature of modern communications, but rapid progress in illicit decryption brings a continuing need for new schemes that are harder and harder to break. Inspired by the time-varying nature of the cardiorespiratory interaction, here we introduce a new class of secure communications that is highly resistant to conventional attacks. Unlike all earlier encryption p...

Journal: :CoRR 2007
Yingbin Liang H. Vincent Poor

Abstract— The fading wire-tap channel is investigated, where the source-to-destination channel and the source-to-wire-tapper channel are corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information is assumed to be known at both the transmitter and the receiver. The parallel wire-tap channel with independent subchannels is firs...

2003
Andreas Steffen

In an increasing number of distributed embedded applications the individual nodes must communicate with each other over insecure channels like e.g. the public Internet or via wireless communication links. In order to withstand malevolent attacks, the end-to-end communication channels must be secured using cryptographically strong encryption and authentication algorithms. Fortunately, powerful s...

1999
Gary Krahn

For two days in June 1942, the fate of the U.S. Fleet (rebuilt since Pearl Harbor) hung on the meaning of two letters AF. Between December 1941 and June 1942, the Japanese Navy under the command of Admiral Yamamoto had swept from one victory to another. Yamamoto knew it was essential to achieve victories in rapid succession. Given time, America could starve Japan of fuel. At Midway he would dea...

2008
Ihor Kuz Felix Rauch Manuel M. T. Chakravarty Gernot Heiser

An important aspect of dependability in distributed systems relates to security. There are two security related aspects of dependability: confidentiality and integrity. In a system that offers confidentiality, information will only be disclosed to (and services will only be provided to) authorised parties. A system that provides integrity will ensure that alterations (to data or services) can o...

Journal: :International Journal of Automation and Computing 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید