Journal articles on the topic 'Secure communication channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure communication channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
YANG, TAO, and LEON O. CHUA. "CHANNEL-INDEPENDENT CHAOTIC SECURE COMMUNICATION." International Journal of Bifurcation and Chaos 06, no. 12b (1996): 2653–60. http://dx.doi.org/10.1142/s0218127496001727.
Full textMittelbach, Martin, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, and Onur Günlü. "Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels." Entropy 27, no. 3 (2025): 225. https://doi.org/10.3390/e27030225.
Full textAwan, Zohaib Hassan, Abdellatif Zaidi, and Luc Vandendorpe. "Secure Communication Over Parallel Relay Channel." IEEE Transactions on Information Forensics and Security 7, no. 2 (2012): 359–71. http://dx.doi.org/10.1109/tifs.2012.2185493.
Full textBhattacharya, S., T. F. Keefe, and W. T. Tsai. "Covert Channel Secure Hypercube Message Communication." Journal of Parallel and Distributed Computing 26, no. 2 (1995): 233–47. http://dx.doi.org/10.1006/jpdc.1995.1062.
Full textWANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.
Full textWei, Yu-Yan, Zi-Kai Gao, Si-Ying Wang, Ya-Jing Zhu, and Tao Li. "Deterministic secure quantum communication with double-encoded single photons." Acta Physica Sinica 71, no. 5 (2022): 050302. http://dx.doi.org/10.7498/aps.71.20210907.
Full textYang, Yunqi, and Rui Zhang. "High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal." Security and Communication Networks 2023 (April 19, 2023): 1–10. http://dx.doi.org/10.1155/2023/7123175.
Full textA. Aliesawi, Salah, Dena S. Alani, and Abdullah M. Awad. "Secure image transmission over wireless network." International Journal of Engineering & Technology 7, no. 4 (2018): 2758. http://dx.doi.org/10.14419/ijet.v7i4.15691.
Full textPasserini, Federico, and Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel." Electronics 9, no. 4 (2020): 605. http://dx.doi.org/10.3390/electronics9040605.
Full textCosta, D., N. G. de Almeida, and C. J. Villas-Boas. "Secure quantum communication using classical correlated channel." Quantum Information Processing 15, no. 10 (2016): 4303–11. http://dx.doi.org/10.1007/s11128-016-1389-6.
Full textYuzvak, Nazarii, Roman Banakh, and Abdallah A. Z. A. Ibrahim. "Creating secure communication channel with LoRa technology." Advances in Cyber-Physical Systems 10, no. 1 (2025): 111–16. https://doi.org/10.23939/acps2025.01.111.
Full textCulbreth, Scott, and Scott Graham. "Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 513–22. http://dx.doi.org/10.34190/iccws.18.1.964.
Full textWANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.
Full textLa Manna, Mario. "Secure Communications Based on Cognitive Multidisciplinary Strategies." Journal of Systemics, Cybernetics and Informatics 20, no. 4 (2022): 30–33. http://dx.doi.org/10.54808/jsci.20.04.30.
Full textGAO, TING, FENGLI YAN, and ZHIXI WANG. "QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS." International Journal of Modern Physics C 16, no. 08 (2005): 1293–301. http://dx.doi.org/10.1142/s0129183105007881.
Full textYan, Senlin. "Two chaotic synchronizations in er-doped fiber lasers and their application in two-channel coding secure communications." ITM Web of Conferences 45 (2022): 02008. http://dx.doi.org/10.1051/itmconf/20224502008.
Full textRajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (2021): 1563. http://dx.doi.org/10.3390/app11041563.
Full textHao, Yuan, Song Jun, He Qin, et al. "Robust Quantum Secure Direct Communication and Deterministic Secure Quantum Communication over Collective Dephasing Noisy Channel." Communications in Theoretical Physics 50, no. 3 (2008): 627–32. http://dx.doi.org/10.1088/0253-6102/50/3/19.
Full textDONG, LI, XIAO-MING XIU, YA-JUN GAO, and FENG CHI. "MULTIPARTY CONTROLLED DETERMINISTIC SECURE QUANTUM COMMUNICATION THROUGH ENTANGLEMENT SWAPPING." International Journal of Modern Physics C 19, no. 11 (2008): 1673–81. http://dx.doi.org/10.1142/s0129183108013205.
Full textSchaefer, Rafael F., Holger Boche, and H. Vincent Poor. "Secure Communication Under Channel Uncertainty and Adversarial Attacks." Proceedings of the IEEE 103, no. 10 (2015): 1796–813. http://dx.doi.org/10.1109/jproc.2015.2459652.
Full textLu, Bowen, Shiwei Lai, Yajuan Tang, et al. "Intelligent Reflecting Surface Aided Secure Communication with Federated Learning." ICST Transactions on Mobile Communications and Applications 7, no. 4 (2023): e2. http://dx.doi.org/10.4108/eetmca.v7i4.2900.
Full textFu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.
Full textXIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.
Full textWang, Meng, Kaizhi Huang, Zheng Wan, Xiaoli Sun, Liang Jin, and Kai Zhao. "Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation." Entropy 24, no. 8 (2022): 1167. http://dx.doi.org/10.3390/e24081167.
Full textNi, Lei, Xinyu Da, Hang Hu, Yuan Liang, and Ruiyang Xu. "PHY-Aided Secure Communication via Weighted Fractional Fourier Transform." Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7963451.
Full textYadav, Suneel, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee, and Adão Silva. "Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints." Sensors 21, no. 21 (2021): 7160. http://dx.doi.org/10.3390/s21217160.
Full textYuan, Zhen-hua, Chen Chen, Xiang Cheng, Guo-cheng Lv, Liu-qing Yang, and Ye Jin. "Correlated channel model-based secure communications in dual-hop wireless communication networks." Frontiers of Information Technology & Electronic Engineering 18, no. 6 (2017): 796–807. http://dx.doi.org/10.1631/fitee.1700023.
Full textGvozdarev, Aleksey, Tatiana Artemova, Pavel Patralov, and Dmitriy Murin. "The Statistical Analysis of the Security for a Wireless Communication System with a Beaulieu-Xie Shadowed Fading Model Channel." Informatics and Automation 21, no. 5 (2022): 1044–78. http://dx.doi.org/10.15622/ia.21.5.8.
Full textKinzel, W., A. Englert, and I. Kanter. "On chaos synchronization and secure communication." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 368, no. 1911 (2010): 379–89. http://dx.doi.org/10.1098/rsta.2009.0230.
Full textMr., Antony Jose, Fathima Lubna Ms., Jashini Siraju Ms., P. V. Rahana, Saliya Manaf A. P. Ms., and Shabna K. A. Ms. "SACT: AN ANONYMOUS COMMUNICATION TECHNIQUE." International Journal of Advances in Engineering & Scientific Research 3, no. 4 (2016): 43–56. https://doi.org/10.5281/zenodo.10774085.
Full textChang, Wei-Der, Shun-Peng Shih, and Chih-Yung Chen. "Chaotic Secure Communication Systems with an Adaptive State Observer." Journal of Control Science and Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/471913.
Full textSharma, Arunima. "Adaptive beamforming approach for secure communication in 5G network." Computer and Telecommunication Engineering 2, no. 3 (2024): 2628. http://dx.doi.org/10.54517/cte2628.
Full textSharma, Arunima. "Adaptive beamforming approach for secure communication in 5G network." Computer and Telecommunication Engineering 2, no. 3 (2024): 2628. http://dx.doi.org/10.54517/cte.v2i3.2628.
Full textKumar, D. Pavun, S. Nithish Kumar, D. Sakthivel, and S. Saran. "An Anonymous Authentication and Secure Communication Protocol in Ad-Hoc Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1840–45. http://dx.doi.org/10.22214/ijraset.2023.49412.
Full textZhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.
Full textWu, Weiwei. "A secure encryption method of communication channel based on cloud computing technology." Web Intelligence 19, no. 3 (2021): 239–51. http://dx.doi.org/10.3233/web-210470.
Full textHarun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (2020): 1481. http://dx.doi.org/10.3390/sym12091481.
Full textLiu, Lei, Chao Ma, Yong Duan, Xinyu Liu, and Xin Qing. "Channel Estimation and Iterative Decoding for Underwater Acoustic OTFS Communication Systems." Journal of Marine Science and Engineering 12, no. 9 (2024): 1559. http://dx.doi.org/10.3390/jmse12091559.
Full textAthanasakos, Manos, and George Karagiannidis. "Secure Polar Coding for the Primitive Relay Wiretap Channel." Entropy 23, no. 4 (2021): 442. http://dx.doi.org/10.3390/e23040442.
Full textAnshu, Anurag, Masahito Hayashi, and Naqueeb Ahmad Warsi. "Secure Communication Over Fully Quantum Gel’fand-Pinsker Wiretap Channel." IEEE Transactions on Information Theory 66, no. 9 (2020): 5548–66. http://dx.doi.org/10.1109/tit.2020.3005015.
Full textLee, JunSeob, and Kisong Lee. "Secure Communication Via Untrusted Relay with Channel Estimation Error." Journal of Korean Institute of Communications and Information Sciences 44, no. 7 (2019): 1295–98. http://dx.doi.org/10.7840/kics.2019.44.7.1295.
Full textSun, Yonghui, Jinde Cao, and Gang Feng. "An adaptive chaotic secure communication scheme with channel noises." Physics Letters A 372, no. 33 (2008): 5442–47. http://dx.doi.org/10.1016/j.physleta.2008.06.061.
Full textLiyanage, Madhusanka, An Braeken, Anca Delia Jurcut, Mika Ylianttila, and Andrei Gurtov. "Secure communication channel architecture for Software Defined Mobile Networks." Computer Networks 114 (February 2017): 32–50. http://dx.doi.org/10.1016/j.comnet.2017.01.007.
Full textSu-Juan, Qin, Gao Fei, Wen Qiao-Yan, and Zhu Fu-Chen. "Robust Quantum Secure Direct Communication over Collective Rotating Channel." Communications in Theoretical Physics 53, no. 4 (2010): 645–47. http://dx.doi.org/10.1088/0253-6102/53/4/12.
Full textGu, Bin, ShiXin Pei, Biao Song, and Kun Zhong. "Deterministic secure quantum communication over a collective-noise channel." Science in China Series G: Physics, Mechanics and Astronomy 52, no. 12 (2009): 1913–18. http://dx.doi.org/10.1007/s11433-009-0303-y.
Full textAntony, Hyils Sharon Magdalene, and Thulasimani Lakshmanan. "Secure Beamforming in 5G-Based Cognitive Radio Network." Symmetry 11, no. 10 (2019): 1260. http://dx.doi.org/10.3390/sym11101260.
Full textHeshem, A. El Zouka. "PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 31–41. https://doi.org/10.5281/zenodo.8300141.
Full textYang, Lei, Song Gao, ZiYue Liu, and ZhuoJun He. "Secure transmission strategy of multi UAV relays in jamming environment." Journal of Physics: Conference Series 2187, no. 1 (2022): 012015. http://dx.doi.org/10.1088/1742-6596/2187/1/012015.
Full textBerkman, Liubov, Andrii Zakharzhevskyi, and Kostiantyn Lavrinets. "Improving the technology for processing the aggregated data flow of a secure corporate multiservice communication network." Eastern-European Journal of Enterprise Technologies 4, no. 9 (124) (2023): 14–23. http://dx.doi.org/10.15587/1729-4061.2023.285414.
Full textMushenko, Alexey, Julia Dzuba, Alexey Nekrasov, and Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer." Electronics 9, no. 3 (2020): 497. http://dx.doi.org/10.3390/electronics9030497.
Full text