To see the other types of publications on this topic, follow the link: Secure communication channel.

Dissertations / Theses on the topic 'Secure communication channel'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 dissertations / theses for your research on the topic 'Secure communication channel.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Karadag, Gokdeniz. "Secure Communication Channel Mechanisms For Isolated Networks." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611436/index.pdf.

Full text
Abstract:
Current network security solutions are consisted of a single host, with network interfaces of the host connected to protected and external networks at the same time. This design ensures security by restricting traffic flow to a single point, where it can be examined and acted on by a set of rules. However, this design also has a flaw and a single point of failure, that being the vulnerabilities in the security device itself. An adversary would have unhindered access to protected networks if a vulnerability in the security device itself leads to its compromise. To prevent this possibility, hig
APA, Harvard, Vancouver, ISO, and other styles
2

Yune, Jiwon. "Secure communication through free-space channel using quantum illumination." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91882.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 67).<br>Secure communication based on quantum illumination (QI) provides high-speed direct communication in the presence of loss and noise and is secure against passive eavesdropping. Recently, the QI based communication protocol has been demonstrated in a fiber channel. In this thesis, we extend the QI secure communication protocol to a free-space propagation channel. Unlike a fiber channe
APA, Harvard, Vancouver, ISO, and other styles
3

Bassi, German. "Secure Communication and Cooperation in Interference-Limited Wireless Networks." Thesis, CentraleSupélec, 2015. http://www.theses.fr/2015SUPL0018/document.

Full text
Abstract:
Dans cette thèse, nous menons une étude dans le cadre de la théorie de l'information sur deux questions importantes de la communication sans fil : l'amélioration du débit de données dans les réseaux avec interférence grâce à la coopération entre utilisateurs et le renforcement de la sécurité des transmissions à l'aide d'un signal de rétroaction.Dans la première partie de la thèse, nous nous concentrons sur le modèle le plus simple qui intègre à la fois l'interférence et la coopération, le canal à relais et interférence ou IRC (Interference Relay Channel). Notre objectif est de caractériser dan
APA, Harvard, Vancouver, ISO, and other styles
4

Boström, Kim. "Lossless quantum data compression and secure direct communication." Phd thesis, Universität Potsdam, 2004. http://opus.kobv.de/ubp/volltexte/2005/100/.

Full text
Abstract:
Diese Dissertation behandelt die Kodierung und Verschickung von Information durch einen Quantenkanal. Ein Quantenkanal besteht aus einem quantenmechanischen System, welches vom Sender manipuliert und vom Empfänger ausgelesen werden kann. Dabei repräsentiert der individuelle Zustand des Kanals die Nachricht. <br /> <br /> Die zwei Themen der Dissertation umfassen 1) die Möglichkeit, eine Nachricht in einem Quantenkanal verlustfrei zu komprimieren und 2) die Möglichkeit eine Nachricht von einer Partei zu einer einer anderen direkt und auf sichere Weise zu übermitteln, d.h. ohne dass es einer dri
APA, Harvard, Vancouver, ISO, and other styles
5

Bathe, Shivraj Gajanan. "Secure Communication in a Multi-OS-Environment." Master's thesis, Universitätsbibliothek Chemnitz, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-196760.

Full text
Abstract:
Current trend in automotive industry is moving towards adopting the multicore microcontrollers in Electronic Control Units (ECUs). Multicore microcontrollers give an opportunity to run a number of separated and dedicated operating systems on a single ECU. When two heterogeneous operating systems run in parallel on a multicore environment, the inter OS communication between these operating systems become the key factor in the overall performance. The inter OS communication based on shared memory is studied in this thesis work. In a setup where two operating systems namely EB Autocore OS which i
APA, Harvard, Vancouver, ISO, and other styles
6

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alfowzan, Mohammed, Mehrdad Khatami, and Bane Vasic. "Optical Orbital Angular Momentum for Secure and Power Efficient Point-to-Point FSO Communications." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579526.

Full text
Abstract:
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV<br>We address the problem of detection in orbital angular momentum (OAM). The focus of our analysis will be on the power efficient Q-ary Pulse Position Modulation (Q - PPM). Free space optical signals sent through wireless channels are degraded by atmospheric turbulence. In this paper a novel detection approach based on a factor graph representation of OAM Q-PPM signalling is presented to equalize fo
APA, Harvard, Vancouver, ISO, and other styles
8

Larsson, Fredrik. ""Halfpipe Active Channel"- developing a secure communications protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2799.

Full text
Abstract:
<p>With the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network. </p><p>The purpose of this thesis is to develop a secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the fina
APA, Harvard, Vancouver, ISO, and other styles
9

Urlea, Maria. "Numerical Optimization Techniques for Secure Communications Over MIMO Channels." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31859.

Full text
Abstract:
As multimedia applications become more popular, wireless communication systems are expected to reliably provide increased data rates. Multiple Input Multiple Output (MIMO) technologies can meet this demand without using additional bandwidth or transmit power. MIMO is part of modern wireless communication standards. Another critical aspect of communications is to secure the confidentiality of data transmission. Cryptography accomplishes this at the upper layers of the protocol stack. At the physical layer, data travels unencrypted and can be secured by using the channel characteristics to ``hi
APA, Harvard, Vancouver, ISO, and other styles
10

Shafiee, Shabnam. "Signalling and resource allocation for secure communication in gaussian wireless channels." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/7862.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
11

Mansour, Ahmed [Verfasser], Holger [Akademischer Betreuer] Boche, Holger [Gutachter] Boche, and Rafael [Gutachter] Schaefer. "Secure Communication Over Wiretap Channels with Multiple Receivers and Active Jammers / Ahmed Mansour ; Gutachter: Holger Boche, Rafael Schaefer ; Betreuer: Holger Boche." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/1215837631/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ghorbanzadeh, Mohammad. "Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/64390.

Full text
Abstract:
This research addresses the concept of radio resource allocation for cellular communications systems operating in congested and contested environments with an emphasis on end-to-end quality of service (QoS). The radio resource allocation is cast under a proportional fairness formulation which translates to a convex optimization problem. Moreover, the resource allocation scheme considers subscription-based and traffic differentiation in order to meet the QoS requirements of the applications running on the user equipment in the system. The devised resource allocation scheme is realized through a
APA, Harvard, Vancouver, ISO, and other styles
13

Sun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.

Full text
Abstract:
We optimize secret key rates (SKRs) of weak coherent pulse (WCP)-based quantum key distribution (QKD) over time-varying free-space optical channels affected by atmospheric turbulence. The random irradiance fluctuation due to scintillation degrades the SKR performance of WCP-based QKD, and to improve the SKR performance, we propose an adaptive scheme in which transmit power is changed in accordance with the channel state information. We first optimize BB84 and decoy state-based QKD protocols for different channel transmittances. We then present our adaptation method, to overcome scintillation e
APA, Harvard, Vancouver, ISO, and other styles
14

Soderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.

Full text
Abstract:
Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to de
APA, Harvard, Vancouver, ISO, and other styles
15

Krasnowski, Piotr. "Codage conjoint source-chiffrement-canal pour les canaux de communication vocaux sécurisés en temps réel." Thesis, Université Côte d'Azur, 2021. http://www.theses.fr/2021COAZ4029.

Full text
Abstract:
Les risques croissants de violation de la vie privée et d’espionnage associés à la forte croissance des communications mobiles ont ravivé l’intérêt du concept originel de chiffrement de la parole sous forme de signaux audio transmis sur des canaux vocaux non spécifiques. Les méthodes habituelles utilisées pour la transmission de données cryptées par téléphonie analogique se sont révélées inadaptées pour les communications vocales modernes (réseaux cellulaires, VoIP) avec leurs algorithmes de compression de la voix, de détection d’activité vocale et de suppression adaptative du bruit. La faible
APA, Harvard, Vancouver, ISO, and other styles
16

Bloch, Matthieu. "Physical-layer security." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24658.

Full text
Abstract:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.<br>Committee Chair: McLaughlin, Steven; Committee Member: Barros, Joao; Committee Member: Bellissard, Jean; Committee Member: Fekri, Faramarz; Committee Member: Lanterman, Aaron
APA, Harvard, Vancouver, ISO, and other styles
17

Wolf, Anne. "Robust Optimization of Private Communication in Multi-Antenna Systems." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-203827.

Full text
Abstract:
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmission
APA, Harvard, Vancouver, ISO, and other styles
18

Ly, Hung Dinh. "Information-Theoretically Secure Communication Under Channel Uncertainty." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822.

Full text
Abstract:
Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty. First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel uncertainty for decoding the common message at the receivers) and a confident
APA, Harvard, Vancouver, ISO, and other styles
19

"Secure mobile radio communication over narrowband RF channel." Chinese University of Hong Kong, 1992. http://library.cuhk.edu.hk/record=b5887043.

Full text
Abstract:
by Wong Chun Kau, Jolly.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 1992.<br>Includes bibliographical references (leaves 84-88).<br>ABSTRACT --- p.1<br>ACKNOWLEDGEMENT --- p.3<br>Chapter 1. --- INTRODUCTION --- p.7<br>Chapter 1.1 --- Land Mobile Radio (LMR) Communications<br>Chapter 1.2 --- Paramilitary Communications Security<br>Chapter 1.3 --- Voice Scrambling Methods<br>Chapter 1.4 --- Digital Voice Encryption<br>Chapter 1.5 --- Digital Secure LMR<br>Chapter 2. --- DESIGN GOALS --- p.20<br>Chapter 2.1 --- System Concept and Configuration<br>Chapter 2.2 --- Operational Require
APA, Harvard, Vancouver, ISO, and other styles
20

Chang, Ting-Hsu, and 張廷勖. "A Secure Communication Scheme Directly on Quantum Channel." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/23340187112902386960.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>98<br>This paper provides a new quantum communication scheme based on QKD protocol, BB84, to transport data directly on quantum channel, but not on classical channel. On quantum channel, it can be guaranteed that eavesdropper never get correct information. This is a very important difference compared with the traditional method which has to use the one-time pad to encrypt data. In order to transport data directly on quantum channel, Alice and Bob have to share a common set of secrete keys and a common set of measurement bases established by the BB84 protocol. Alice
APA, Harvard, Vancouver, ISO, and other styles
21

Ghoreishi, Madiseh Masoud. "Wireless secret key generation versus capable adversaries." Thesis, 2011. http://hdl.handle.net/1828/3766.

Full text
Abstract:
This dissertation applies theories and concepts of wireless communications and signal processing to the security domain to assess the security of a Wireless secret Key Generation (WKG) system against capable eavesdroppers, who employ all the feasible tools to compromise the system’s security. The security of WKG is evaluated via real wireless measurements, where adversary knows and applies appropriate signal processing tools in ordere to predict the generated key with the communicating pair. It is shown that in a broadband stationary wireless communication channel, (e.g. commercial off-
APA, Harvard, Vancouver, ISO, and other styles
22

Sarma, Siddhartha. "Resource Allocation in Wireless Networks for Secure Transmission and Utility Maximization." Thesis, 2016. http://etd.iisc.ac.in/handle/2005/3123.

Full text
Abstract:
Resource allocation in wireless networks is one of the most studied class of problems. Generally, these problems are formulated as utility maximization problems under relevant constraints. The challenges posed by these problems vary widely depending on the nature of the utility function under consideration. Recently, the widespread prevalence of wireless devices prompted researchers and engineers to delve into the security issues of wireless communication. As compared to the wired medium, ensuring security for the wireless medium is more challenging mainly due to the broadcast nature of the t
APA, Harvard, Vancouver, ISO, and other styles
23

Sarma, Siddhartha. "Resource Allocation in Wireless Networks for Secure Transmission and Utility Maximization." Thesis, 2016. http://hdl.handle.net/2005/3123.

Full text
Abstract:
Resource allocation in wireless networks is one of the most studied class of problems. Generally, these problems are formulated as utility maximization problems under relevant constraints. The challenges posed by these problems vary widely depending on the nature of the utility function under consideration. Recently, the widespread prevalence of wireless devices prompted researchers and engineers to delve into the security issues of wireless communication. As compared to the wired medium, ensuring security for the wireless medium is more challenging mainly due to the broadcast nature of the t
APA, Harvard, Vancouver, ISO, and other styles
24

MolavianJazi, Ebrahim. "Secure communications over arbitrarily varying wiretap channels." 2009. http://etd.nd.edu/ETD-db/theses/available/etd-12112009-112419/.

Full text
Abstract:
Thesis (M.S.E.E.)--University of Notre Dame, 2009.<br>Thesis directed by J. Nicholas Laneman for the Department of Electrical Engineering. "December 2009." Includes bibliographical references (leaves 118-121).
APA, Harvard, Vancouver, ISO, and other styles
25

Chun-WeiYang and 楊竣崴. "Fault Tolerant Quantum Secure Communications over Collective-noise Channels." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/07813287367794804346.

Full text
Abstract:
博士<br>國立成功大學<br>資訊工程學系碩博士班<br>101<br>Recently, due to the rapid development of quantum computers and quantum computings, it is believed that many difficult mathematical problems can easily be resolved in near future with the presence of quantum computers. Accordingly, the various well known cryptosystems whose security is based on these mathematical problems can easily be broken and then they become insecure. Eventually, that makes the researches of the quantum computation as well as quantum cryptography busy in order to resolve the aforesaid issues. By using the quantum phenomena, e.g., the n
APA, Harvard, Vancouver, ISO, and other styles
26

Wolf, Anne. "Robust Optimization of Private Communication in Multi-Antenna Systems." Doctoral thesis, 2015. https://tud.qucosa.de/id/qucosa%3A29547.

Full text
Abstract:
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years. We analyze two physical-layer approaches that can ensure the secret transmissio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!