نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2016
Ahmed Korichi

The alert data dissemination is one of principal’s several works in VANETs network research. This latter is composed of autonomous entities characterized by high speed and predictable regular mobility "intelligent vehicles". Indeed, several studies are proposed for improvement security in this networks .Which is considered one of the most important objective of Intelligent Transport Systems (IT...

2012
Nineta Polemi Theodoros Ntouskas

Commercial ports are large scale infrastructures which their Information and Telecommunication (PIT) systems o↵er critical services and host sensitive data. However the current maritime legislation or standardization e↵orts do not su ciently cover the IT security of the commercial ports. Identifying these needs we propose a collaborative environment o↵ering security management services includin...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :Telecommunication Systems 2000
Chern-Tang Lin Shiuh-Pyng Shieh

Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to sup...

2003
Makan Pourzandi Axelle Apvrille E. Gingras A. Medenou David Gordon

The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, a Distributed Security Infrastructure (DSI) has been initiated for carrier-class Linux clusters. DSI is a security framework which focuses on providing distributed security services and simplifying security administrat...

2004
Dadong Wan Anatole Gershman

Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones...

2015
Michalis Kanakakis Shenja van der Graaf Costas Kalogiros Wim Vanobberghen

In this article, we describe an approach for computing the current trust level of individual users towards an online system and present initial validation results from a small-scale experiment. This trust computational model relies upon survey research for identifying the set of key trust attributes and grouping users into four segments of expected behaviors. Each user’s initial trust level is ...

2011
Micah Jones Kevin W. Hamlen

Client software for modern service-oriented web architectures is often implemented as mobile code applets made available by service-providers. Protecting clients from malicious mobile code is therefore an important concern in these architectures; however, the burden of security enforcement is typically placed entirely on the client. This approach violates the service-oriented paradigm. A method...

Journal: :Computing and Informatics 2012
Anton Cizmar Ján Papaj L'ubomír Dobos

The new model used to integrating security and Quality of Service (QoS) as one parameter in mobile ad-hoc network (MANET) is introduced and studied in this article. Security and QoS represent a highly important field of research in MANET and they are still being considered separately with no mechanisms used to establish cooperation between them. This new model provides alternative to cooperatio...

2005
Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. μTESLA and multi-level μTESLA have been proposed to provide such service for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level μTESLA schemes can scale up to large senso...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید