Journal articles on the topic 'Hybrid Secure Communication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hybrid Secure Communication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dhall, Sangeeta, Bharat Bhushan, and Shailender Gupta. "An Improved Hybrid Mechanism for Secure Data Communication." International Journal of Computer Network and Information Security 8, no. 6 (2016): 67–79. http://dx.doi.org/10.5815/ijcnis.2016.06.08.
Full textJain, Amrita, and Vivek Kapoor. "Policy for Secure Communication using Hybrid Encryption Algorithm." International Journal of Computer Applications 125, no. 10 (2015): 16–20. http://dx.doi.org/10.5120/ijca2015906035.
Full textLin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.
Full textSristi J, Andrew Vivan X, A Ashoka, Y B Tulasi, and Dr. Manjunath C R. "Software Based Implementation of a Hybrid Quantum Secure Cryptosystem for Secure Communication and Data Protection." International Journal on Smart & Sustainable Intelligent Computing 2, no. 2 (2025): 30–49. https://doi.org/10.63503/j.ijssic.2025.112.
Full textKuo, Wen Hsiung, Pin Chiang Su, and Jiang Lung Liu. "A Secure Hybrid P2P Network Mobile Communication Device Design." Applied Mechanics and Materials 479-480 (December 2013): 968–72. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.968.
Full textSasikala Devi, S., and Antony Selvadoss Danamani. "Efficient Hybrid Tree Key Distribution for Secure Multicast Communication." International Journal on Communications Antenna and Propagation (IRECAP) 4, no. 5 (2014): 202. http://dx.doi.org/10.15866/irecap.v4i5.3951.
Full textGÜRFİDAN, Remzi, and Mevlüt ERSOY. "A New Hybrid Encryption Approach for Secure Communication: GenComPass." International Journal of Computer Network and Information Security 12, no. 4 (2020): 1–10. http://dx.doi.org/10.5815/ijcnis.2020.04.01.
Full textRencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.
Full textSridhar, S., and S. Smys. "Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment." Wireless Personal Communications 111, no. 1 (2019): 429–42. http://dx.doi.org/10.1007/s11277-019-06867-0.
Full textNigischer, Christopher, and Jonas Vogt. "Automated Electric Mobility Secure Hybrid Communication with Data Protection." ATZelektronik worldwide 13, no. 4 (2018): 16–21. http://dx.doi.org/10.1007/s38314-018-0042-9.
Full textReddicherla, Vikram Raju, Umashankar Rawat, Y. Jeevan Nagendra Kumar, and Atef Zaguia. "Secure Vertical Handover to NEMO Using Hybrid Cryptosystem." Security and Communication Networks 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6751423.
Full textS, Dr Manishankar. "Secure IoT based Emergency Communication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3044–48. http://dx.doi.org/10.22214/ijraset.2022.44560.
Full textKabalci, Yasin, and Muhammad Ali. "Improved Hybrid Precoder Design for Secure mmWave MIMO Communications." Elektronika ir Elektrotechnika 26, no. 4 (2020): 72–77. http://dx.doi.org/10.5755/j01.eie.26.4.25857.
Full textGour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.
Full textRushika, Umesh Dhobale, and Tulshiram Gavali Shweta. "Blockchain for Secure Defense Communication Networks." Recent Trends in Control and Converter 8, no. 2 (2025): 6–21. https://doi.org/10.5281/zenodo.15348865.
Full textAmbareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.
Full textKapoor, Vivek, and Rati Gupta. "Hybrid symmetric cryptography approach for secure communication in web application." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 5 (2021): 1179–87. http://dx.doi.org/10.1080/09720529.2021.1936900.
Full textA. Moosa, Arwa, Malik A. Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp850-858.
Full textFouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.
Full textMoosa, Arwa A., Malik Abdulrazzaq Jabbar Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850–58. https://doi.org/10.11591/ijeecs.v28.i2.pp850-858.
Full textKiedrowski, Piotr. "Toward More Efficient and More Secure Last Mile Smart Metering and Smart Lighting Communication Systems with the Use of PLC/RF Hybrid Technology." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/675926.
Full textM, Dr Ganavi. "An Hybrid Encryption Approach to Secure Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40090.
Full textCHEN, WEI CHING, and JOHN YUAN. "SECURE COMMUNICATION BASED ON A HYBRID OF CHAOS AND ICA ENCRYPTIONS." International Journal of Modern Physics B 25, no. 02 (2011): 255–64. http://dx.doi.org/10.1142/s0217979211056950.
Full textKunchok, Tenzin, and Prof Kirubanand V. B. "A lightweight hybrid encryption technique to secure IoT data transmission." International Journal of Engineering & Technology 7, no. 2.6 (2018): 236. http://dx.doi.org/10.14419/ijet.v7i2.6.10776.
Full textLi, Rui, Guang Jun Zhang, Tao Zhu, Xu Jing Wang, and Jun Dong. "Generalized Hybrid Dislocated Function Projective Synchronization of Chaotic Systems with Time Delay." Applied Mechanics and Materials 574 (July 2014): 672–78. http://dx.doi.org/10.4028/www.scientific.net/amm.574.672.
Full textK.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.
Full textZehra, Afzal, and Kumar Manoj. "A Hybrid Method for Secure Communication and Performance Analysis in VANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1086–91. https://doi.org/10.35940/ijeat.E1022.069520.
Full textGoumidi, Mohammed Abdessamad Zigh Ehlem Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555–63. https://doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Full textK, Roslin Dayana. "ELLIPTICAL ADVANCED ENCRYPTION STANDARD - MODERN CRYPTOGRAPHY FOR SECURE DATA COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3351–57. https://doi.org/10.21917/ijct.2024.0497.
Full textFu, Yudi, Mengfan Cheng, Weidong Shao, et al. "Analog-digital hybrid chaos-based long-haul coherent optical secure communication." Optics Letters 46, no. 6 (2021): 1506. http://dx.doi.org/10.1364/ol.421770.
Full textSubedar, Zuhi, and Araballi Ashwini. "Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication." International Journal of Mathematical Sciences and Computing 6, no. 4 (2020): 35–41. http://dx.doi.org/10.5815/ijmsc.2020.04.04.
Full textVuppala, Satyanarayana, Sudip Biswas, and Tharmalingam Ratnarajah. "An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks." IEEE Transactions on Communications 64, no. 8 (2016): 3507–19. http://dx.doi.org/10.1109/tcomm.2016.2587287.
Full textUcar, Seyhan, Sinem Coleri Ergen, and Oznur Ozkasap. "IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon." IEEE Transactions on Vehicular Technology 67, no. 9 (2018): 8667–81. http://dx.doi.org/10.1109/tvt.2018.2840846.
Full textKim, Jin-Mook, and Jeong-Kyung Moon. "Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments." International Journal of Distributed Sensor Networks 10, no. 2 (2014): 828092. http://dx.doi.org/10.1155/2014/828092.
Full textRamalingam, Balakrishnan, Amirtharajan Rengarajan, and John Bosco Balaguru Rayappan. "Hybrid image crypto system for secure image communication– A VLSI approach." Microprocessors and Microsystems 50 (May 2017): 1–13. http://dx.doi.org/10.1016/j.micpro.2017.02.003.
Full textGopikrishnan, S., and P. Priakanth. "HSDA: hybrid communication for secure data aggregation in wireless sensor network." Wireless Networks 22, no. 3 (2015): 1061–78. http://dx.doi.org/10.1007/s11276-015-1122-x.
Full textYin, Aihan, and Hongchao Liang. "Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks." Wireless Personal Communications 80, no. 3 (2014): 1049–62. http://dx.doi.org/10.1007/s11277-014-2070-y.
Full textIssad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.
Full textEl-Shafai, W., S. El-Rabaie, M. M. El-Halawany, and Fathi E. Abd El-Samie. "Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication." International Journal of Communication Systems 31, no. 4 (2017): e3478. http://dx.doi.org/10.1002/dac.3478.
Full textAlatawi, Mohammed Naif. "A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities." International Journal of Computer Networks and Applications 10, no. 5 (2023): 776. http://dx.doi.org/10.22247/ijcna/2023/223423.
Full textK., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.
Full textAnnamalai, Meenatchi Sundaram Muthu Selva, Chao Jin, and Khin Mi Mi Aung. "Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption." Applied Sciences 12, no. 22 (2022): 11462. http://dx.doi.org/10.3390/app122211462.
Full textAli, J. Abboud, N. Albu-Rghaif Ali, and Kirebut Jassim Abbood. "Balancing Compression and Encryption of Satellite Imagery." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3568–86. https://doi.org/10.11591/ijece.v8i5.pp3568-3586.
Full textOjetunde, Babatunde, Takuya Kurihara, Kazuto Yano, Toshikazu Sakano, and Hiroyuki Yokoyama. "A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication." Network 5, no. 2 (2025): 20. https://doi.org/10.3390/network5020020.
Full textZhang, Shiqi, and Chao Zheng. "Quantum Secure Direct Communication Technology-Enhanced Time-Sensitive Networks." Entropy 27, no. 3 (2025): 221. https://doi.org/10.3390/e27030221.
Full textZhang, Gang, Niting Cui, and Tianqi Zhang. "Novel Chaos Secure Communication System Based on Walsh Code." Journal of Electrical and Computer Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/649096.
Full textKEERTHANA, V., J. Mangaiyarkarasi, and A. N. Arun. "A Hybrid Cloud Approach for Secure Authorized Deduplication System Using Facial Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–11. http://dx.doi.org/10.55041/ijsrem37048.
Full textZakaret, Carine, Nikolaos Peladarinos, Vasileios Cheimaras, et al. "Blockchain and Secure Element, a Hybrid Approach for Secure Energy Smart Meter Gateways." Sensors 22, no. 24 (2022): 9664. http://dx.doi.org/10.3390/s22249664.
Full textMr.Dilish, Babu.J*, and Mohan Kumar Dr.S. "A SURVEY ON SECURE COMMUNICATION IN PUBLIC NETWORK DURING DISASTER." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 430–34. https://doi.org/10.5281/zenodo.47577.
Full textAbdessamad, Goumidi Mohammed, Zigh Ehlem, and Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Full text