Academic literature on the topic 'Secure communication system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure communication system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure communication system"

1

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
APA, Harvard, Vancouver, ISO, and other styles
2

B, Bindu. "Multi-Modal Content Filtration and Secure Communication System." International Journal of Science and Research (IJSR) 14, no. 4 (2025): 2101–4. https://doi.org/10.21275/sr25424100601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

S, Dr Manishankar. "Secure IoT based Emergency Communication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3044–48. http://dx.doi.org/10.22214/ijraset.2022.44560.

Full text
Abstract:
Abstract: The Internet of Things is the most recent & rapidly developing technology of our time. This paper proposed the idea of Hybrid-cellular Wireless sensor network architecture which uses a functioning cellular base station. A routing scheme is also proposed for the emergency scenario that systematically utilizes accessible devices. Wireless devices are taken into account in the proposed emergency communication architecture, which also supports WSN's self-organizing function. Within a few hours, this communication model may be put up in disaster-stricken communities. The proposed methodology can achieve the goal of establishing communication between trapped and rescue volunteers by providing emergency communication infrastructure. A control station serves as an accurate information system for rescue teams' mobility, organization, and coordination. To assure their legality, a secure communication environment with rigorous IP address registration is provided. This approach provides a solution to issues such as calamity recovery networks and trapped victim search and rescue operations
APA, Harvard, Vancouver, ISO, and other styles
4

Campos-Cantón, Isaac, Eric Campos-Cantón, José Salomé Murguía-Ibarra, and Mayra Elizabeth Chavira-Rodríguez. "Secure Communication System Using Chaotic Signals." Ingeniería, investigación y tecnología 10, no. 1 (2009): 21–27. http://dx.doi.org/10.22201/fi.25940732e.2009.10n1.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhengguo Li, Kun Li, Changyun Wen, and Yeng Chai Soh. "A new chaotic secure communication system." IEEE Transactions on Communications 51, no. 8 (2003): 1306–12. http://dx.doi.org/10.1109/tcomm.2003.815058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dai, WenChao, Yuan Lu, Jun Zhu, and GuiHua Zeng. "An integrated quantum secure communication system." Science China Information Sciences 54, no. 12 (2011): 2578–91. http://dx.doi.org/10.1007/s11432-011-4489-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ke, Qiang. "Numerical Simulation of Chaotic Laser Secure Communication." Advanced Materials Research 798-799 (September 2013): 570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.570.

Full text
Abstract:
Using the idea of drive-response synchronization, we discuss the principle, numerical simulation of chaotic laser communication. Compared to traditional communications systems, the chaotic laser communication system has a well-kept secret performance, but the chaos synchronization requirements are very strict.
APA, Harvard, Vancouver, ISO, and other styles
8

Paraïso, Taofiq K., Thomas Roger, Davide G. Marangon, et al. "A photonic integrated quantum secure communication system." Nature Photonics 15, no. 11 (2021): 850–56. http://dx.doi.org/10.1038/s41566-021-00873-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sathyan, T., and T. Kirubarajan. "Markov-jump-system-based secure chaotic communication." IEEE Transactions on Circuits and Systems I: Regular Papers 53, no. 7 (2006): 1597–609. http://dx.doi.org/10.1109/tcsi.2006.877885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alvarez, G., F. Montoya, M. Romera, and G. Pastor. "Cryptanalysis of a chaotic secure communication system." Physics Letters A 306, no. 4 (2003): 200–205. http://dx.doi.org/10.1016/s0375-9601(02)01502-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure communication system"

1

Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szabo, Florian Akos. "Modelling of secure communication system for IoT enabled waste management system." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76028.

Full text
Abstract:
Urban expansion is a key driving force of our modern world. Increasing environmental footprint is an example issue that is directly caused by it. The city of St. Petersburg employs on average almost 500 garbage trucks on a daily basis and spends more than 1 million US Dollars every year to collect, process and manage waste. In order for megacities, such as St. Petersburg, to cope with its effects, new ideas are needed. This seems to be an obvious area in which technology can be used to improve current practices and help save resources. In this study, we investigate how the Internet of Things, blockchain and Quantum Key Distribution systems can be integrated to provide a safe and efficient method for improving the waste management process in the context of Smart City projects. Our implemented simulations in Mininet show that there are some clear challenges with regards to the adoption of blockchain technology in an IoT environment. However, the integration of quantum channels and the use of Quantum Key Distribution within the blockchain infrastructure shows good potential for balancing the advantages and disadvantages of blockchain. With the implemented simulations we demonstrate the superior capabilities of the Proof of Infrastructure blockchain solution, which can facilitate secure transactions within the waste management scenario.
APA, Harvard, Vancouver, ISO, and other styles
3

Zakria, Saber Nabil Shohdy. "Secure DS-CDMA communication system using chaotic and FPGA." Thesis, University of Kent, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tulasidas, Sivanesan. "Secure expandable communication framework for POCT system development and deployment." Thesis, Brunel University, 2018. http://bura.brunel.ac.uk/handle/2438/17132.

Full text
Abstract:
Health-care delivery in developing countries has many challenges because they do not have enough resources for meeting the healthcare needs and they lack testing lab infras- tructures in communities. It has been proven that Point-Of-Care (POC) testing can be considered as one of the ways to resolve the crisis in healthcare delivery in these com- munities. The POC testing is a mission critical processes in which the patient conduct tests outside of laboratory environment and it needs a secure communication system of architecture support which the research refers as POCT system Almost every ten years there will be a new radio access technology (RAT) is released in the wireless communication system evolution which is primarily driven by the 3GPP standards organisation. It is challenging to develop a predictable communication sys- tem in an environment of frequent changes originated by the 3GPP and the wireless operators. The scalable and expandable network architecture is needed for cost-effective network management, deployment and operation of the POC devices. Security mecha- nisms are necessary to address the specific threats associated with POCT system. Se- curity mechanisms are necessary to address the specific threats associated with POCT system. The POCT system communication must provide secure storage and secure com- munication to maintain patient data privacy and security. The Federal Drug Admin- istration (FDA) reports the leading causes of defects and system failures in medical devices are caused by gaps between the requirements, implementation and testing. The research was conducted, and technical research contributions are made to resolve the issues and challenges related to the POCT system. A communication protocol implemented at the application level, independent of radio access technologies. A new methodology was created by combining Easy Approach to Requirement Specifications (EARS) methodology and Use Case Maps (UCM) model which is a new approach and it addresses the concerns raised by the FDA. Secure cloud architecture was created which is a new way of data storage and security algorithms models were designed to address the security threats in the POCT system. The security algorithms, secure cloud architecture and the communication protocol coexist together to provide Radio access technology Independent Secure and Expandable (RISE) POCT system. These are the contributions to new knowledge that came out of the research. The research was conducted with a team of experts who are the subject matter experts in the areas such as microfluidics, bio-medical, mechanical engineering and medicine.
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Shubhanker. "Efficient, Scalable and Secure Vehicular Communication System : An Experimental Study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286820.

Full text
Abstract:
Awareness of vehicles’ surrounding conditions is important in today’s intelligent transportation system. A wide range of effort has been put in to deploy Vehicular Communication (VC) systems to make driving conditions safer and more efficient. Vehicles are aware of their surroundings with the help of authenticated safety beacons in VC systems. Since vehicles act according to the information conveyed by such beacons, verification of beacons plays an important role in becoming aware of and predicting the status of the sender vehicle. The idea of implementing secure mechanisms to deal with a high rate of incoming beacons and processing them with high efficiency becomes a very important part of the whole VC network. The goal of this work was to implement a scheme that deals with a high rate of the incoming beacon, preserve non-repudiation of the accepted messages which contains information about the current and near-future status of the sender vehicle, and at the same time keep the computation overhead as low as possible. Along with this, maintaining user privacy from a legal point of view as well as from a technical perspective by implementing privacy-enhancing technologies. These objectives were achieved by the introduction of Timed Efficient Stream Loss-Tolerant Authentication (TESLA), periodic signature verification, and cooperative verification respectively. Four different scenarios were implemented and evaluated, starting and building upon the baseline approach. Each approach addressed the problems that were aimed at this work and results show improved scalability and efficiency with the introduction of TESLA, periodic signature verification, and cooperative verification.<br>Medvetenheten om fordons omgivande förhållanden är viktig i dagens intelligenta transportsystem. Ett stort antal ansträngningar har lagts ned för att distribuera VC system för att göra körförhållandena säkrare och effektivare. Fordon är medvetna om sin omgivning med hjälp av autentiserade säkerhetsfyrar i VC system. Eftersom fordon agerar enligt den information som förmedlas av sådana fyrar, spelar verifiering av fyrar en viktig roll för att bli medveten om och förutsäga avsändarfordonets status. Idén att implementera säkra mekanismer för att hantera en hög frekvens av inkommande fyrar och bearbeta dem med hög effektivitet blir en mycket viktig del av hela VC nätverket. Målet med detta arbete var att implementera ett schema som behandlar en hög hastighet för det inkommande fyren, bevara icke-förkastelse av de accepterade meddelandena som innehåller information om den aktuella och närmaste framtida statusen för avsändarfordonet och samtidigt håll beräkningen så låg som möjligt. Tillsammans med detta upprätthåller användarnas integritet ur juridisk synvinkel såväl som ur ett tekniskt perspektiv genom att implementera integritetsförbättrande teknik. Dessa mål uppnåddes genom införandet av TESLA, periodisk signatur verifiering respektive samarbets verifiering. Fyra olika scenarier implementerades och utvärderades med utgångspunkt från baslinjemetoden. Varje tillvägagångssätt tog upp de problem som riktades mot detta arbete och resultaten visar förbättrad skalbarhet och effektivitet med införandet av TESLA, periodisk signatur verifiering och samarbets verifiering.
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.

Full text
Abstract:
In todays heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Platforms that support such computation on image processing purposes are called secure image processing protocols. In this thesis, we propose a new security model, called quasi information theoretic (QIT) security. Under the proposed model efficient protocols on two basic image processing algorithms linear filtering and thresholding are developed. For both problems we consider two situations: 1) only two parties are involved where one holds the data and the other possesses the processing algorithm; 2) an additional non-colluding third party exists. Experiments show that our proposed protocols improved the computational time significantly compared with the classical cryptographical couterparts as well as providing reasonable amount of security as proved in the thesis
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Hao, Zhiping Zheng, and Naitong Zhang. "A NEW TYPE OF SOFTWARE ORIENTED SECURE SYSTEM FOR WIRELESS COMMUNICATION." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608292.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Wireless information transmission is easy to be suffered from various threats in an open environment. In this paper, we proposed a new type of software oriented secure system for direct wireless information transmission. We first present the special functions and requirements, which have to be satisfied during introducing the secure system. Then, we divide the secure system into three stages: normal operating stage, key presetting stage, and key replanting stage. The security, reliability and the computing complexity of this system are analyzed in this paper. Finally, we carried out this secure system by software and proved the availability.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yan. "A Secure Gateway Localization and Communication System for Vehicular Ad Hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24034.

Full text
Abstract:
Intelligent Transport System (ITS) has become a hot research topic over the past decades. ITS is a system that applies the following technologies to the whole transportation management system efficiently, including information technique, wireless communication, sensor networks, control technique, and computer engineering. ITS provides an accurate, real time and synthetically efficient transportation management system. Obviously, Vehicular Ad Hoc NETworks (VANETs) attract growing attention from both the research community and industry all over the world. This is because a large amount of applications are enabled by VANETs, such as safety related applications, traffic management, commercial applications and general applications. When connecting to the internet or communicating with different networks in order to access a variety of services using VANETs, drivers and passengers in different cars need to be able to exchange messages with gateways from their vehicles. A secure gateway discovery process is therefore critical, because vehicles should not be subject to security attacks while they are communicating; however, currently there is no existing protocol focusing on secure gateway discovery. In this thesis, we first analyze and compare current existing secure service discovery protocols and then we propose a Secure Gateway Localization and Communication System for Vehicular Ad Hoc Networks (SEGAL), which concentrates on the security issue in gateway discovery. We focus on the authentication aspect by proposing secure cluster based VANETs, that can ensure the gateway discovery messages exchanged through secure clusters. We present the principle and specific process of our SEGAL protocol and analyze its performance to guarantee its outstanding practical applicability.
APA, Harvard, Vancouver, ISO, and other styles
9

Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.

Full text
Abstract:
Email is a well established technology used worldwide for enterprise and private communication through the Internet. It allows people to communicate using text, but also other information formats used either as HTML or attached files. The communication is performed without the need of synchronized endpoints, based on the use of email servers that take care of storing and forwarding email letters. All these properties and much more standardized ones do not include security, which makes the choice of service provider hard when the letters sent in the email system include sensitive information. In the last few years there has been a big interest and growth in the area of cloud computing. Placing resources (computers, applications, information) out of local environments, thanks to the high speed connections in the Internet, provides countless possibilities. Actually, even email systems can be deployed in cloud computing environments, including all the email services (interface, client, and server) or a part of them. From a security point of view, the use of cloud computing leads to many threats generated by external parties and even the cloud providers. Because of these reasons, this work intends to present an innovative approach to security in a cloud environment, focusing on the security of an email system. The purpose is to find a solution for an email system deployable in a cloud environment, with all the functionality deployed on a external machine. This email system must be completely protected, minimizing the actions taken by the user, which should just connect to a portal through a web browser. Along this report there are details about the foundations, progress and findings of the research that has been carried out. The main objectives involve: researching on the concepts and state of the art of cloud computing, email systems and security; presenting a cloud computing architecture that will take care of the general aspects of security; designing an email system for that architecture that contains mechanisms protecting it from the possible security threats; and finally, implementing a simplified version of the design to test and prove the feasibility of it. After all the mentioned activities, the findings are commented, mentioning the applicability of research results to the current situation. Obviously, there is place for more research in depth of several topics related to cloud computing and email, that is why some of them are suggested.
APA, Harvard, Vancouver, ISO, and other styles
10

MENG, LI. "A BUILDING BLOCK APPROACH FOR DESIGNING SELF-SYNCHRONOUS CHAOTIC SYSTEMS FOR SECURE COMMUNICATION." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1057759148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secure communication system"

1

Gilbert, Jessica. How can an online communication system improve Tesco.com's home-shopping delivery service and how secure would this system be?. LCP, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Torrieri, Don J. Principles of secure communication systems. Artech House, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rhee, Man Young. Cryptography and secure communications. McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cao, Jiannong. Seamless and secure communications over heterogeneous wireless networks. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Günter, Sieben, Böing Winfried та Universität zu Köln, ред. Proceedings Secubank ʼ88: Secure banking information systems. Datakontext-Verlag, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institution of Electrical Engineers. Electronics Division. and Institution of Electrical Engineers. Computing & Control Division., eds. Second International Conference on Secure Communication Systems: 27-28 October 1986. The Institution, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Eberspächer, ed. Sichere Daten, sichere Kommunikation: Datenschutz und Datensicherheit in Telekommunikations- und Informationssystemen = Secure information, secure communication : privacy and information security in communication and information systems. Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Banerjee, Santo. Chaos synchronization and cryptography for secure communications: Applications for encryption. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hong, Y. W. Peter, Pang-Chang Lan, and C. C. Jay Kuo. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-4560-14-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Morrow, Shenae Y. Automated messaging for the Global Command and Control System: Analysis of upgrading communications in the NPS Secure Systems Technology Laboratory (SSTL). Naval Postgraduate School, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secure communication system"

1

Tlelo-Cuautle, Esteban, José de Jesús Rangel-Magdaleno, and Luis Gerardo De la Fraga. "Secure Communication System." In Engineering Applications of FPGAs. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-34115-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kammourieh, Brian, Nahid Ebrahimi Majd, and Ahmad Hadaegh. "BumpChat: A Secure Mobile Communication System." In Advances in Security, Networks, and Internet of Things. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71017-0_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Parikh, Dhruv Piyush, Aayush Dhanotiya, and P. Vetrivelan. "Blockchain-Based Secure IoT Telemedicine System." In Futuristic Communication and Network Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4625-6_92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elalfy, Omar Ahmed, Rasha Hasan, and Youssef Mohamed Ibrahim Ahmed. "Internet of Things Based Secure Attendance System." In Signals and Communication Technology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88634-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Verma, Pramode K., Mayssaa El Rifai, and Kam Wai Clifford Chan. "An Ultra-Secure Router-to-Router Key Exchange System." In Multi-photon Quantum Secure Communication. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8618-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Gang, Li-fang He, and Tian-qi Zhang. "A Secure Communication System Based on DCSK." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31965-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moona, Rajat. "transCryptFS: A Trusted and Secure File System." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29852-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Park, Joon S., Myong H. Kang, and Judith N. Froscher. "A Secure Workflow System for Dynamic Collaboration." In IFIP Advances in Information and Communication Technology. Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maget, Christoph. "Vehicle Guidance System Based on Secure Mobile Communication." In Internet of Things. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76493-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Hongyun, Bin Li, and Zhenqing He. "UAV-Assisted Secure Communication System with Dynamic Constraints." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-2268-9_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure communication system"

1

Zhang, Yue, Enyu Li, and Wen Yang. "Energy Harvesting Node Assisted Secure Communication System." In 2024 4th International Conference on Intelligent Communications and Computing (ICICC). IEEE, 2024. https://doi.org/10.1109/icicc63565.2024.10780743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gnatyuk, Sergiy, Tetiana Okhrimenko, and Dmytro Proskurin. "AI-based encryption system for secure UAV communication." In 2024 IEEE 7th International Conference on Actual Problems of Unmanned Aerial Vehicles Development (APUAVD). IEEE, 2024. https://doi.org/10.1109/apuavd64488.2024.10765879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Musale, Vinayak, Anand Bhongale, Amruta Amune, Abhinav Saxena, Chhavikant Mahobia, and Sarthak Panse. "Secure Electoral Voting System Using Homomorphic Encryption." In 2024 International Conference on Communication, Control, and Intelligent Systems (CCIS). IEEE, 2024. https://doi.org/10.1109/ccis63231.2024.10932066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Das, Nayana, Saikat Basu, Goutam Paul, and Vijay S. Rao. "User-Authenticated Device-Independent Quantum Secure Direct Communication Protocol." In 2024 IEEE 37th International System-on-Chip Conference (SOCC). IEEE, 2024. http://dx.doi.org/10.1109/socc62300.2024.10737816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gerard, Aravind. "Secure ROS: Imposing secure communication in a ROS system." In ROSCon2017. Open Robotics, 2017. http://dx.doi.org/10.36288/roscon2017-900262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gerard, Aravind. "Secure ROS: Imposing secure communication in a ROS system." In ROSCon2017. Open Robotics, 2017. http://dx.doi.org/10.36288/roscon2017-900806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qi Bing, Tang Liang-rui, Li Jing, and Sun Yi. "A new chaotic secure communication system." In IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20081052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Luo, Fan, Nian Fang, Zhaoming Huang, and Chunhua Wang. "A new optical secure communication system." In Asia-Pacific Optical Communications, edited by Dominique Chiaroni, Wanyi Gu, Ken-ichi Kitayama, and Chang-Soo Park. SPIE, 2007. http://dx.doi.org/10.1117/12.745129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Showkatbakhsh, Mehrdad, Paulo Tabuada, and Suhas Diggavi. "Secure system identification." In 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2016. http://dx.doi.org/10.1109/allerton.2016.7852363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Jeffrey, Robert Houghton, Thomas Hilton, and Kwok Fai Cheah. "Secure Data Communication via Lingual Transformation." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2018. http://dx.doi.org/10.24251/hicss.2018.685.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure communication system"

1

Alzahrani, Naif. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

VEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, 2023. http://dx.doi.org/10.12731/er0743.18112023.

Full text
Abstract:
The computer game "The Way to a secure Internet" was created by teachers of the MDOU "D/ s № 73" of Magnitogorsk on the cross-platform environment for the development of Unity computer programs. The game is aimed at older preschool children. It is aimed at the formation of life skills of students in the information society in order to ensure the information security of children. The main educational material is the selection of rules for safe behavior when using the Internet information network by students, taking into account the peculiarities of children's perception of information. The plot of the game situation and the algorithm of sequential actions of the user in order to move from one level to another suggest the following stages of the educational course and, accordingly, game tasks for the player: get and assimilate information about the dangers on the Internet, listen (read) the rule about safe behavior on the Internet, get acquainted with the game situation, choose the right solution, applying the rule about safe behavior on the Internet. The introductory information contains options for dangerous situations in which a child may find himself in the real world with incorrect communication on the Internet. The information included in the training information introduces preschoolers to the rules of safe behavior on the Internet. The control of the assimilation of educational material is presented at the game level of solving a problem situation. When choosing an answer, the game reality is realized in one of two directions: the correct answer - the training material is learned – the player moves to the next level; the wrong answer – the training material is not learned – the player returns to the level of familiarity with the rule. The system of criteria for evaluating user behavior during the implementation of an interactive game is expressed in the accumulation of bonuses (presented in the form of stars that appear on the playing field in the process of solving game problems).
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, D. P., D. Ferrari, P. V. Rangan, and B. Sartirana. A Protocol for Secure Communication in Large Distributed Systems. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada179326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anderson, David P., and P. V. Rangan. A Basis for Secure Communication in Large Distributed Systems. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada604023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal entanglement distribution in overcoming photon loss, decoherence, and distance limitations in quantum networks. Additionally, it examines the hybrid integration of quantum-classical networking architectures, real-world experimental implementations such as satellite-based quantum communication and metropolitan-scale quantum cryptography, and the scalability challenges related to hardware, error correction, and network synchronization. The study also addresses post-quantum cryptography, quantum-resistant algorithms, and cybersecurity vulnerabilities in quantum communication, offering a comprehensive roadmap for the development of secure, scalable, and globally interconnected quantum networks. Keywords: Scalable quantum networks, quantum entanglement, entanglement distribution, quantum key distribution (QKD), secure communication, quantum repeaters, quantum memory, photon loss mitigation, quantum cryptography, post-quantum security, hybrid quantum-classical networks, metropolitan-scale quantum networks, satellite-based quantum communication, quantum internet, quantum coherence, quantum error correction, quantum teleportation, multi-nodal quantum entanglement, cybersecurity in quantum networks, quantum-resistant algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Cochran, Douglas. Scale-Based Techniques in Secure and Jam-Resistant Communication Systems. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada311078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DeNatale, Jeff F. Micromachined Radio Frequency (RF) Switches and Tunable Capacitors for Higher Performance Secure Communications Systems. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada413515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum error correction (QEC), deep learning-driven anomaly detection, and reinforcement learning for adaptive encryption, provide a self-learning security model for quantum communication systems. The study also examines quantum blockchain integration, AI-optimized quantum network traffic management, and secure quantum biometric authentication as emerging trends in AI-enhanced quantum cybersecurity. Additionally, it evaluates industry adoption, policy considerations, and global quantum security initiatives across China, the US, the EU, and India. By addressing scalability, automation, and real-time quantum security monitoring, this research provides a roadmap for leveraging AI in next-generation secure quantum networks to enable fault-tolerant, self-healing cybersecurity frameworks. Keywords: Quantum intelligence, machine learning, secure quantum networks, AI-driven quantum cryptography, quantum key distribution, post-quantum cryptography, neural network-based quantum error correction, deep learning anomaly detection, reinforcement learning in quantum security, AI-driven quantum authentication, quantum blockchain security, quantum biometric authentication, quantum-enhanced AI cybersecurity, real-time quantum security monitoring, AI-optimized quantum routing, scalable quantum encryption, quantum cybersecurity policy, AI-powered post-quantum security, self-healing quantum networks, AI-driven quantum forensics.
APA, Harvard, Vancouver, ISO, and other styles
9

Stadler, M., and Z. Pecenak. Secure Communications Concept and API Concept for integrating XENDEE Positronix with TESLA PowerPack system at Site 300. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1873633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Krelina, Michal. An Introduction to Military Quantum Technology for Policymakers. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/drdq1599.

Full text
Abstract:
Quantum technology, based on quantum mechanics, is undergoing a ‘second quantum revolution’ that focuses on controlling individual particles to unlock disruptive applications in computing, communications and sensing. These advances promise major military and security benefits—such as ultra-secure communications, enhanced battlefield sensing and optimized logistics—but they also carry risks if adversaries gain a technological edge. Governments worldwide are heavily investing in quantum research and development, reflecting its dual civilian and military nature. However, current systems remain error-prone and limited in scalability, while there are concerns over potential misuse. Moreover, key gaps persist in understanding how quantum tools might reshape arms control verification and international security. Given the rapid pace of development, proactive policymaking and appropriate oversight measures are essential to harness quantum technology’s benefits while mitigating its risks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography