Academic literature on the topic 'Hybrid Secure Communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hybrid Secure Communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hybrid Secure Communication"

1

Dhall, Sangeeta, Bharat Bhushan, and Shailender Gupta. "An Improved Hybrid Mechanism for Secure Data Communication." International Journal of Computer Network and Information Security 8, no. 6 (2016): 67–79. http://dx.doi.org/10.5815/ijcnis.2016.06.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jain, Amrita, and Vivek Kapoor. "Policy for Secure Communication using Hybrid Encryption Algorithm." International Journal of Computer Applications 125, no. 10 (2015): 16–20. http://dx.doi.org/10.5120/ijca2015906035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.

Full text
Abstract:
In order to solve the problems of identity solidification, key duration, and lack of anonymity in communications between unmanned aerial vehicles (UAVs) and ground control stations (GCSs), a mutual secure communication scheme named Dynamic Identity and Hybrid Encryption is proposed in this paper. By constructing an identity update mechanism and a lightweight hybrid encryption system, the anonymity and untraceability of the communicating parties can be realized within a resource-limited environment, and threats such as man-in-the-middle (MITM) attacks, identity forgery, and message tampering ca
APA, Harvard, Vancouver, ISO, and other styles
4

Sristi J, Andrew Vivan X, A Ashoka, Y B Tulasi, and Dr. Manjunath C R. "Software Based Implementation of a Hybrid Quantum Secure Cryptosystem for Secure Communication and Data Protection." International Journal on Smart & Sustainable Intelligent Computing 2, no. 2 (2025): 30–49. https://doi.org/10.63503/j.ijssic.2025.112.

Full text
Abstract:
Current cryptographic systems and information security methods are largely based on the computational intractability and impracticability of reversing complex cryptographic algorithms and protocols. The foundation of secure communication and data protection strategies that we rely on a daily basis is provided by this computational difficulty. However, quantum computers with sufficient processing power could breach these basic security assumptions, making it possible to recover the cryptographic keys used to safeguard sensitive data and compromise widely used key exchange techniques. A viable s
APA, Harvard, Vancouver, ISO, and other styles
5

Kuo, Wen Hsiung, Pin Chiang Su, and Jiang Lung Liu. "A Secure Hybrid P2P Network Mobile Communication Device Design." Applied Mechanics and Materials 479-480 (December 2013): 968–72. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.968.

Full text
Abstract:
Wireless Networkinfrastructure has Developed Rapidly with the Popularity of Personal Mobiledevices. Userscan Use Mobile Devices to Roam the Wireless Network Environment Conductingtransactions such as Sending Messages and Accessing the Internet. Networkcommunication has Become a Lifestyle Necessity. the Application of Information Technologyproducts also Brings IT Security Issues. the Wireless Network Environment Makesmessages Susceptible to Eavesdropping and Data Tampering Attacks. in Addition,the Mobile Device Computation Ability Presents Power Limiting Issues. Therefore,achieving Efficiency a
APA, Harvard, Vancouver, ISO, and other styles
6

Sasikala Devi, S., and Antony Selvadoss Danamani. "Efficient Hybrid Tree Key Distribution for Secure Multicast Communication." International Journal on Communications Antenna and Propagation (IRECAP) 4, no. 5 (2014): 202. http://dx.doi.org/10.15866/irecap.v4i5.3951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

GÜRFİDAN, Remzi, and Mevlüt ERSOY. "A New Hybrid Encryption Approach for Secure Communication: GenComPass." International Journal of Computer Network and Information Security 12, no. 4 (2020): 1–10. http://dx.doi.org/10.5815/ijcnis.2020.04.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sridhar, S., and S. Smys. "Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment." Wireless Personal Communications 111, no. 1 (2019): 429–42. http://dx.doi.org/10.1007/s11277-019-06867-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nigischer, Christopher, and Jonas Vogt. "Automated Electric Mobility Secure Hybrid Communication with Data Protection." ATZelektronik worldwide 13, no. 4 (2018): 16–21. http://dx.doi.org/10.1007/s38314-018-0042-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hybrid Secure Communication"

1

Prakash, Abhinav. "Anonymous and Secure Communication in a Wireless Mesh Network." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352397027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Full text
Abstract:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des a
APA, Harvard, Vancouver, ISO, and other styles
3

Sahli, Nabil. "Contribution au problème de la sécurité sémantique des systèmes : approche basée sur l'ingénierie dirigée par les modèles." Electronic Thesis or Diss., Aix-Marseille, 2019. http://www.theses.fr/2019AIXM0699.

Full text
Abstract:
Les infrastructures industrielles critiques seront dotées de plusieurs équipements embarqués intelligents. Elles exploitent des systèmes complexes, embarqués, intelligents et sémantiques pour leurs fonctionnements, en local et à distance, dans un contexte de développement, de villes intelligentes et du web des objets. Elles emploient, de plus en plus de systèmes «contrôle/commande», pour la surveillance des plateformes industrielles critiques, en temps réel. Les infrastructures critiques seront de plus en plus communicantes dans le cadre des échanges des alarmes et la mise en place de marchés
APA, Harvard, Vancouver, ISO, and other styles
4

Biswas, Jayanta. "Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks." Thesis, 2005. https://etd.iisc.ac.in/handle/2005/1402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biswas, Jayanta. "Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks." Thesis, 2005. http://etd.iisc.ernet.in/handle/2005/1402.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hybrid Secure Communication"

1

Ali, Salman, and Faisal Anwer. "A hybrid cryptographic scheme for secure communication." In Advances in Science, Engineering and Technology. CRC Press, 2025. https://doi.org/10.1201/9781003641544-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trikha, Pushali, and Lone Seth Jahanzaib. "Secure Communication: Using Double Compound-Combination Hybrid Synchronization." In Proceedings of International Conference on Artificial Intelligence and Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4992-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moatemri, Maroua, Hamdi Eltaief, Ali El Kamel, and Habib Youssef. "Secure East-West Communication to Authenticate Mobile Devices in a Distributed and Hierarchical SDN." In Hybrid Intelligent Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghosh, Papri, and Vishal Thakor. "Optimization of Hybrid Encryption Algorithm for Secure Communication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1165-9_89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prakash, Shiva, and Ashish Rajput. "Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7386-1_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kardi, Amine, and Rachid Zagrouba. "Hybrid Cryptography Algorithm for Secure Data Communication in WSNs: DECRSA." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6981-8_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qureshi, Shahana Gajala, Sasmita Padhy, Preetam Suman, and Amrit Suman. "Hybrid Secure Clustered Nature-Inspired Decision Support System for Secure Data Communication in Cyberspace." In Cyberology. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003409571-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Sharan Preet, and Surender Singh. "A Digital Steganography Technique Using Hybrid Encryption Methods for Secure Communication." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9331-2_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Islam, Nahida, Ishrat Sultana, and Md Sazzadur Rahman. "HKMS-AMI: A Hybrid Key Management Scheme for AMI Secure Communication." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4673-4_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baranidharan, A., P. Velmurugadass, and A. Athiraja Atheeswaran. "Developing WBAN with secure data access and improved hybrid blockchain techniques." In Security Issues in Communication Devices, Networks and Computing Models. CRC Press, 2025. https://doi.org/10.1201/9781003513445-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hybrid Secure Communication"

1

Deng, Wensheng, Bin Qiu, and Wenchi Cheng. "Multi-Beam Symbol-Level Secure Communication for Hybrid Near- and Far-Field Communications." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Yihao, Zhou Su, Qichao Xu, Dongfeng Fang, Yuntao Wang, and Yiliang Liu. "Cooperative Secure Transmission for Hybrid Aerial IRS-assisted Communication System." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Williams, K. Lalith, Y. Durga Prasanth, and M. Jeyaselvi. "Hybrid AI Architecture using Edge-Cloud Computing for Secure V2X Communication." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

He, Chengyan, Hao Peng, Zhaolin Zhang, Chuang Han, and Ling Wang. "Robust Secure Hybrid Beamforming for RSMA Integrated Sensing and Communication Systems." In 2024 IEEE 7th International Conference on Electronics and Communication Engineering (ICECE). IEEE, 2024. https://doi.org/10.1109/icece63871.2024.10976885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aquina, Nick, Simon Rommel, and Idelfonso Tafur Monroy. "Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution." In 2024 24th International Conference on Transparent Optical Networks (ICTON). IEEE, 2024. http://dx.doi.org/10.1109/icton62926.2024.10648124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jadhav, Swati, Smeet Darekar, Anurag Deshmukh, Bhavesh Deore, and Dev Datir. "Hybrid Steganographic and Encryption Approach using Color Analysis for Secure Image Communication." In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT). IEEE, 2024. https://doi.org/10.1109/icaiccit64383.2024.10912405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

G, Kala Priydarshini, Hitesh Kalra, Lakshmi Sevukamoorthy, Chitrakant O. Banchhor, P. Gajendran, and Ayaan Faiz. "A Hybrid Signcryption Approach for Blockchain-Based Secure Communication in IoMT Networks." In 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2024. https://doi.org/10.1109/ictbig64922.2024.10911712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chkirbene, Zina, Ala Gouissem, Ridha Hamila, Unal Devrim, and Arafat Al-Dweik. "Secure UAV-IRS Communication: A Hybrid Genetic Algorithms and Gradient Descent Approach." In 2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2024. https://doi.org/10.1109/pimrc59610.2024.10817367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chauhan, Guman Singh, Kannan Srinivasan, Rahul Jadon, Rajababu Budda, Venkata Surya Teja Gollapalli, and Joseph Bamidele Awotunde. "GMAC-Enhanced Secure IoT Communication with CNN-LSTM Hybrid Model for Intrusion Detection." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10985390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kazi, Atiya, Vinayak Bharadi, and Kaushal Prasad. "Attention-Driven CNN-LSTM Hybrid Models for Secure Dynamic Signature Verification." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064121.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hybrid Secure Communication"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!