To see the other types of publications on this topic, follow the link: Secure communication system.

Journal articles on the topic 'Secure communication system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure communication system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
APA, Harvard, Vancouver, ISO, and other styles
2

B, Bindu. "Multi-Modal Content Filtration and Secure Communication System." International Journal of Science and Research (IJSR) 14, no. 4 (2025): 2101–4. https://doi.org/10.21275/sr25424100601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

S, Dr Manishankar. "Secure IoT based Emergency Communication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3044–48. http://dx.doi.org/10.22214/ijraset.2022.44560.

Full text
Abstract:
Abstract: The Internet of Things is the most recent & rapidly developing technology of our time. This paper proposed the idea of Hybrid-cellular Wireless sensor network architecture which uses a functioning cellular base station. A routing scheme is also proposed for the emergency scenario that systematically utilizes accessible devices. Wireless devices are taken into account in the proposed emergency communication architecture, which also supports WSN's self-organizing function. Within a few hours, this communication model may be put up in disaster-stricken communities. The proposed methodology can achieve the goal of establishing communication between trapped and rescue volunteers by providing emergency communication infrastructure. A control station serves as an accurate information system for rescue teams' mobility, organization, and coordination. To assure their legality, a secure communication environment with rigorous IP address registration is provided. This approach provides a solution to issues such as calamity recovery networks and trapped victim search and rescue operations
APA, Harvard, Vancouver, ISO, and other styles
4

Campos-Cantón, Isaac, Eric Campos-Cantón, José Salomé Murguía-Ibarra, and Mayra Elizabeth Chavira-Rodríguez. "Secure Communication System Using Chaotic Signals." Ingeniería, investigación y tecnología 10, no. 1 (2009): 21–27. http://dx.doi.org/10.22201/fi.25940732e.2009.10n1.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhengguo Li, Kun Li, Changyun Wen, and Yeng Chai Soh. "A new chaotic secure communication system." IEEE Transactions on Communications 51, no. 8 (2003): 1306–12. http://dx.doi.org/10.1109/tcomm.2003.815058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dai, WenChao, Yuan Lu, Jun Zhu, and GuiHua Zeng. "An integrated quantum secure communication system." Science China Information Sciences 54, no. 12 (2011): 2578–91. http://dx.doi.org/10.1007/s11432-011-4489-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ke, Qiang. "Numerical Simulation of Chaotic Laser Secure Communication." Advanced Materials Research 798-799 (September 2013): 570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.570.

Full text
Abstract:
Using the idea of drive-response synchronization, we discuss the principle, numerical simulation of chaotic laser communication. Compared to traditional communications systems, the chaotic laser communication system has a well-kept secret performance, but the chaos synchronization requirements are very strict.
APA, Harvard, Vancouver, ISO, and other styles
8

Paraïso, Taofiq K., Thomas Roger, Davide G. Marangon, et al. "A photonic integrated quantum secure communication system." Nature Photonics 15, no. 11 (2021): 850–56. http://dx.doi.org/10.1038/s41566-021-00873-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sathyan, T., and T. Kirubarajan. "Markov-jump-system-based secure chaotic communication." IEEE Transactions on Circuits and Systems I: Regular Papers 53, no. 7 (2006): 1597–609. http://dx.doi.org/10.1109/tcsi.2006.877885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alvarez, G., F. Montoya, M. Romera, and G. Pastor. "Cryptanalysis of a chaotic secure communication system." Physics Letters A 306, no. 4 (2003): 200–205. http://dx.doi.org/10.1016/s0375-9601(02)01502-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Álvarez, G., F. Montoya, M. Romera, and G. Pastor. "Breaking parameter modulated chaotic secure communication system." Chaos, Solitons & Fractals 21, no. 4 (2004): 783–87. http://dx.doi.org/10.1016/j.chaos.2003.12.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Igor Kotenko, Dmitry Levshun, Yannick Chevalier, and Andrey Chechulin. "Secure Communication in Cyber-Physical Systems." Research Briefs on Information and Communication Technology Evolution 4 (September 15, 2018): 98–106. http://dx.doi.org/10.56801/rebicte.v4i.70.

Full text
Abstract:
The paper considers a new design methodology for organization of reliable and secure data transferenvironment in cyber-physical systems, which contain microcontroller-based devices. The keyidea of the design methodology is in providing of most rational solution to improve the data transferenvironment according to functional and non-functional requirements and limitations to securityand reliability. This solution will became trusted only after verification process checking its correctnessand compatibility. If a cyber-physical system is dynamic and contains various mobile devices,the design process of such system will determine additional requirements and limitations to its datatransfer environment. The application of the design methodology is presented for I2C network ofArduino-based devices that are used for interaction with external event sources in the IntegratedCyber-Physical Security System.
APA, Harvard, Vancouver, ISO, and other styles
13

Durdu, Ali, Yılmaz Uyaroğlu, and Ahmet Turan Özcerit. "A Novel Chaotic System for Secure Communication Applications." Information Technology And Control 44, no. 3 (2015): 271–78. http://dx.doi.org/10.5755/j01.itc.44.3.7720.

Full text
Abstract:
The secure communication using synchronization between identical chaotic systems have been introduced in literature for a long time. A well-known practical application of chaotic synchronized systems is the Pecora and Carroll (P-C) secure communication method. In this paper, the P-C secure communication algorithm is applied to a novel three dimensional, autonomous chaotic attractor. Having a 45○ slope between sub-driver and sub-receiver circuits of a novel chaotic attractor clearly demonstrates that it can be used for the purpose of secure communications.DOI: http://dx.doi.org/10.5755/j01.itc.44.3.7720
APA, Harvard, Vancouver, ISO, and other styles
14

Bhatia, Mahinder Pal Singh, Manjot Kaur Bhatia, and Sunil Kumar Muttoo. "Secure Group Message Transfer Stegosystem." International Journal of Information Security and Privacy 9, no. 4 (2015): 59–76. http://dx.doi.org/10.4018/ijisp.2015100103.

Full text
Abstract:
Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.
APA, Harvard, Vancouver, ISO, and other styles
15

LIAN, KUANG-YOW, TUNG-SHENG CHIANG, PETER LIU, and CHIAN-SONG CHIU. "SYNCHRONIZATION AND SECURE COMMUNICATION FOR CHAOTIC SYSTEMS: THE MODULATED FUZZY SYSTEM DESIGN." International Journal of Bifurcation and Chaos 11, no. 05 (2001): 1397–410. http://dx.doi.org/10.1142/s021812740100278x.

Full text
Abstract:
This paper presents a modulated T–S fuzzy model that can be applied to both continuous/discrete chaotic synchronization, chaotic model following and secure communication. The modulated T–S fuzzy model is constructed by choosing the common factor or the only variable of nonlinear terms in chaotic systems as the premise variable of fuzzy rules and output signal. Following this model, fuzzy chaotic synchronization is achieved by utilizing linear matrix inequalities design and some restricting conditions can be relaxed. This simplified design framework can be applied to many well-known chaotic systems. Also, for chaotic communications, this modulated T–S fuzzy model illustrates asymptotical recovering of the message. Moreover, the usage of combinational states as the coupling signal for Luré type systems is taken into consideration. In this case, the receiver design for synchronization and secure communication is also proposed. The simulation results are shown with expected satisfactory performance.
APA, Harvard, Vancouver, ISO, and other styles
16

Lakshmi, J. Guru. "Blockchain and Cryptography Communication System." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2527–32. http://dx.doi.org/10.22214/ijraset.2023.50702.

Full text
Abstract:
Abstract: Blockchain is an innovative technology that overcomes these threats, allowing sensitive operations to be decentralized while maintaining a high level of security. Eliminate the need for trusted intermediaries. The blockchain is accessible to network nodes and keeps track of all transactions that have taken place. The goal of our work is to offer a secure communication solution based on blockchain technology. In this project, we explain why blockchain should secure communications and offer a blockchain-based messaging design pattern that maintains the performance and security of data stored on the blockchain by using a smart contract to protect identity and associated verify public key and validate a user certificate. The system is entirely a combination of blockchain and cryptography for communication systems
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Yo-Ram, and Soo-Hyun Oh. "A Secure Mobile Payment System for Near Field Communication System." Journal of the Korea Academia-Industrial cooperation Society 14, no. 7 (2013): 3487–94. http://dx.doi.org/10.5762/kais.2013.14.7.3487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jeong, Youn-Chang, Se-Wan Ji, Changho Hong, Hee Su Park, and Jingak Jang. "Deterministic Secure Quantum Communication on the BB84 System." Entropy 22, no. 11 (2020): 1268. http://dx.doi.org/10.3390/e22111268.

Full text
Abstract:
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment.
APA, Harvard, Vancouver, ISO, and other styles
19

Hui Li, and Zhanzhan Zhang. "Noise Secure Communication System Based on EPR Protocol." International Journal of Advancements in Computing Technology 5, no. 4 (2013): 32–38. http://dx.doi.org/10.4156/ijact.vol5.issue4.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kumar, Kokkonda Shiva, Subhani Shaik, and Naga Gopi Raju Vullam. "Block Chain and Cryptography based Secure Communication System." Asian Journal of Research in Computer Science 15, no. 3 (2023): 40–46. http://dx.doi.org/10.9734/ajrcos/2023/v15i3324.

Full text
Abstract:
The block chain is a cutting-edge technology that reduces risks by allowing vital tasks to be decentralized procedure, while retaining a high level of security. It eliminates the dependable intermediaries from the network. The block chain technology, which records all previous transactions, these accessible to all network nodes. The goal of our paper is to create a block chain-based secure communication system. We also explain about why block chain would improve communication security? It also proposes a model design for block chain-based messaging that focuses on training the performance. Security of data recorded on the block chain, using a smart contract to identities and their associated public keys, as well as validating the user’s certificate.
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Narendra, and Aloka Sinha. "Chaos-based secure communication system using logistic map." Optics and Lasers in Engineering 48, no. 3 (2010): 398–404. http://dx.doi.org/10.1016/j.optlaseng.2009.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chou, Yao-Hsin, Yu-Ting Lin, Guo-Jyun Zeng, Fang-Jhu Lin, and Chi-Yuan Chen. "Controlled Bidirectional Quantum Secure Direct Communication." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/694798.

Full text
Abstract:
We propose a novel protocol for controlled bidirectional quantum secure communication based on anonlocal swapgate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on thenonlocal swapgate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.
APA, Harvard, Vancouver, ISO, and other styles
23

ACHO, LEONARDO. "EXPANDED LORENZ SYSTEMS AND CHAOTIC SECURE COMMUNICATION SYSTEMS DESIGN." Journal of Circuits, Systems and Computers 15, no. 04 (2006): 607–14. http://dx.doi.org/10.1142/s0218126606003234.

Full text
Abstract:
Using Lyapunov theory, the Lorenz chaotic system was partitioned in two parts, where one of them is globally asymptotically stable. This partition facilitated the state–space expansion of the Lorenz system from three to four-order. This new four-order Lorenz system, one of its states is synchronized with other. This expansion allows us to design a secure communication system where the dynamic of the receiver is just one-order. The proposed secure communication system uses two-lines of transmission. Simulation results are included to demonstrate the performance of this secure communication system based on this new four-order Lorenz system.
APA, Harvard, Vancouver, ISO, and other styles
24

MAYBHATE, ANIL, R. E. AMRITKAR, and D. R. KULKARNI. "ESTIMATION OF INITIAL CONDITIONS AND SECURE COMMUNICATION." International Journal of Bifurcation and Chaos 13, no. 10 (2003): 3079–84. http://dx.doi.org/10.1142/s0218127403008454.

Full text
Abstract:
We estimate the initial conditions of a multivariable dynamical system from a scalar signal, using a modified Newton–Raphson method incorporating the time evolution. We can estimate initial conditions of periodic and chaotic systems and the required length of scalar signal is very small. An important application of the method is in secure communications. The communication procedure has several advantages as compared to others using dynamical systems.
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Min, Wei Zhang, Jianxing Guo, Xiaotian Song, and Guilu Long. "Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network." Entropy 25, no. 11 (2023): 1548. http://dx.doi.org/10.3390/e25111548.

Full text
Abstract:
Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this limitation, a proposal has been made to transmit the messages encrypted with classical cryptography, such as post-quantum algorithms, between intermediate nodes of the network, where encrypted messages in quantum states are read out in classical bits, and sent to the next node using QSDC. In this paper, we report a real-time demonstration of a computationally secure relay for a quantum secure direct communication network. We have chosen CRYSTALS-KYBER which has been standardized by the National Institute of Standards and Technology to encrypt the messages for transmission of the QSDC system. The quantum bit error rate of the relay system is typically below the security threshold. Our relay can support a QSDC communication rate of 2.5 kb/s within a 4 ms time delay. The experimental demonstration shows the feasibility of constructing a large-scale quantum network in the near future.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Jinsong, Kai Wu, Jinping Niu, and Yanyan Li. "Joint Active and Passive Beamforming in RIS-Assisted Secure ISAC Systems." Sensors 24, no. 1 (2024): 289. http://dx.doi.org/10.3390/s24010289.

Full text
Abstract:
This paper investigates joint beamforming in a secure integrated sensing and communications (ISAC) system assisted by reconfigurable intelligent surfaces (RIS). The system communicates with legitimate downlink users, detecting a potential target, which is a potential eavesdropper attempting to intercept the downlink communication information from the base station (BS) to legitimate users. To enhance the physical-layer secrecy of the system, we design and introduce interference signals at the BS to disrupt eavesdroppers’ attempts to intercept legitimate communication information. The BS simultaneously transmits communication and interference signals, both utilized for communication and sensing to guarantee the sensing and communication quality. By jointly optimizing the BS active beamformer and the RIS passive beamforming matrix, we aim to maximize the achievable secrecy rate and radiation power of the system. We develop an effective scheme to find the active beamforming matrix through fractional programming (FP) and semi-definite programming (SDP) techniques and obtain the RIS phase shift matrix via a local search technique. Simulation results validate the effectiveness of the proposed methods in enhancing communication and sensing performance. Additionally, the results demonstrate the effectiveness of introducing the interference signals and RIS in enhancing the physical-layer secrecy of the ISAC system.
APA, Harvard, Vancouver, ISO, and other styles
27

CHEN, SHIH-LIANG, SHU-MING CHANG, WEN-WEI LIN, and TINGTING HWANG. "DIGITAL SECURE-COMMUNICATION USING ROBUST HYPER-CHAOTIC SYSTEMS." International Journal of Bifurcation and Chaos 18, no. 11 (2008): 3325–39. http://dx.doi.org/10.1142/s0218127408022408.

Full text
Abstract:
In this paper, we propose a robust hyper-chaotic system that is suitable for digital secure-communication. The system consists of many coupled robust logistic maps that form a hyper-chaotic system. It has a higher degree of complexity than traditional discrete-time secure-communication systems that use only a single map. Moreover, the system has a very large parameter space which grows along with system precision. Hence, attacking the system by the method of map reconstruction in current computation technology is not feasible. Statistical analysis shows that the system achieves very high security level. Finally, two hardware architectures (multiple-cycle and pipelined) are proposed for area and performance optimization, respectively.
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Yeong-Jeu. "A Novel Design Architecture of Secure Communication System with Reduced-Order Linear Receiver." International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (2018): 1154–57. http://dx.doi.org/10.31142/ijtsrd20212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Bo, and Xiucheng Dong. "Secure Communication Based on a Hyperchaotic System with Disturbances." Mathematical Problems in Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/616137.

Full text
Abstract:
This paper studies the problem on chaotic secure communication, and a new hyperchaotic system is included for the scheme design. Based on Lyapunov method andH∞techniques, two kinds of chaotic secure communication schemes in the case that system disturbances exist are presented for the possible application in real engineering; corresponding theoretical derivations are also provided. In the end, some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed schemes.
APA, Harvard, Vancouver, ISO, and other styles
30

Yeong-Jeu, Sun. "A Novel Design Architecture of Secure Communication System with Reduced Order Linear Receiver." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 1154–57. https://doi.org/10.31142/ijtsrd20212.

Full text
Abstract:
In this paper, a new concept about secure communication system is introduced and a novel secure communication design with reduced order linear receiver is developed to guarantee the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are given to demonstrate the feasibility and effectiveness of the obtained results. Yeong-Jeu Sun "A Novel Design Architecture of Secure Communication System with Reduced-Order Linear Receiver" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: https://www.ijtsrd.com/papers/ijtsrd20212.pdf
APA, Harvard, Vancouver, ISO, and other styles
31

Khan, Rabia, and Dushantha Nalin K. Jayakody. "Full Duplex Component-Forward Cooperative Communication for a Secure Wireless Communication System." Electronics 9, no. 12 (2020): 2102. http://dx.doi.org/10.3390/electronics9122102.

Full text
Abstract:
The technological breakthrough in the form of Internet of Things (IoT), Big data and connected world is increasing the demand of better spectrum utilization. Half-Duplex (HD) transmission is mostly used in the earlier communication systems. The high transmission demand requires the better utilization of the existing spectrum. There are several possible ways to overcome the problem of better spectrum usage. In-Band Full Duplex (IBFD) is one of the techniques that can double the Spectral Efficiency (SE) in a Beyond 5G (B5G) communication system. In this paper, our aim is to use the spectral efficient IBFD scheme to improve the security of the system with minimum interference. The interference can be reduced by the addition of orthogonality between the transmitted and received signal of a relay. A component-forward scheme is proposed in this paper to create such orthogonality. For achieving the desired aim, IBFD is used with Device-to-Device (D2D), Artificial Noise (AN), Modulation based orthogonalization, Radio Frequency Energy Harvesting (RFEH) and proposed Full-Duplex Component Forward (FD-CF) algorithm for multiple relays. We also use non-linear harvested power as one of the sources to reuse the exiting power for evaluating the system performance. The derivation of Secrecy Outage Probability (SOP) and throughput is derived in this paper for the FD-CF cooperative communication and is explored with and without non-linear RFEH. The simulation results show the comparison between the component-forward and decode-and-forward communication with one or more relays.
APA, Harvard, Vancouver, ISO, and other styles
32

Wei, Peng Cheng, Wei Ran, and Jun Jian Huang. "A Novel Secure Communication Scheme Based on Chaotic System." Advanced Materials Research 255-260 (May 2011): 2242–47. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2242.

Full text
Abstract:
A secure communication scheme based on piecewise linear chaotic system is proposed. Two Chaotic Systems are used in this algorithm, with a symbolic sequence generated by a Chaotic System the message sequence is tracked, employing the chaotic masking technique the message for transmitted is encrypted with a binary sequence extracted from another Chaotic System. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security and it is suitable for practical use in the secure communication.
APA, Harvard, Vancouver, ISO, and other styles
33

Nigar, Nahida. "An efficient encryption-secure communication using symmetric key." International Journal of Engineering & Technology 7, no. 4 (2019): 6510–14. http://dx.doi.org/10.14419/ijet.v7i4.26613.

Full text
Abstract:
To stop unauthorized disclosure of confidential information we need to secure our data. To secure data we need to use a secure cryptographic system. The conventional systems of data security are not suitable for multimedia as well as different data types. This paper is concerned with the development of a secure communication system which will satisfy some aspects such as reliability, maintainability, security, and user-friendliness. This project is based on the conventional method of cryptography known as symmetric key encryption technique named AES and 3DES made the system faster, better immune to attacks, greater complexity, easier encryption/decryption, and much more advanced security feature included. This project work is designed and developed for secure communication on different platforms. Unlike any other application, this software can encrypt any length of a video message, audio, text, etc. using a key and then decrypts the ciphertext with the same key to see the plaintext on the receiving end. Whatever the data is encrypted the ciphertext will be in text type which will give more security to the data because the hacker cannot guess the data type to hack. Comparing with other security based application system, the proposed system can be used for any type of communication in both online and offline. Â
APA, Harvard, Vancouver, ISO, and other styles
34

Gaurav, Raj1 and Kamaljit Kaur2. "Secure Cloud Communication for Effective Cost Management System through MSBE." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, June (2018): 01–12. https://doi.org/10.5281/zenodo.1440834.

Full text
Abstract:
In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. We propose an improved Broker Cloud Communication Paradigm (BCCP) with integration of security issues. Two algorithms are included, first is Secure Optimized Route Cost Finder (S-ORCF) to find optimum route between broker and cloud on the behalf of cost factor and second is Secure Optimized Route Management (S-ORM) to maintain optimum route. These algorithms proposed with cryptographic integrity of the secure route discovery process in efficient routing approaches between broker and cloud. There is lack in Dynamic Source Routing Approach to verify whether any intermediate node has been deleted, inserted or modified with no valid authentication. We use symmetric cryptographic primitives, which is made possible due to multisource broadcast encryption scheme. This paper outlines the use of secure route discovery protocol (SRDP) that employs such a security paradigm in cloud computing
APA, Harvard, Vancouver, ISO, and other styles
35

Saleh, Saraireh. "A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY." International Journal of Computer Networks & Communications (IJCNC) 5, may (2013): 13. https://doi.org/10.5281/zenodo.3975462.

Full text
Abstract:
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security.
APA, Harvard, Vancouver, ISO, and other styles
36

Aramudhan, M., and K. Mohan. "New Secure Communication Protocols For Mobile E-health System." International Journal of Computer Applications 8, no. 4 (2010): 10–15. http://dx.doi.org/10.5120/1201-1713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Benkouider, Khaled, Aceng Sambas, Ibrahim Mohammed Sulaiman, Mustafa Mamat, and Kottakkaran Sooppy Nisar. "Secure Communication Scheme based on A New Hyperchaotic System." Computers, Materials & Continua 73, no. 1 (2022): 1019–35. http://dx.doi.org/10.32604/cmc.2022.025836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yijie Shi, and Qiaoyan Wen. "An ID-based Secure Communication Scheme for Control System." International Journal of Advancements in Computing Technology 4, no. 15 (2012): 98–104. http://dx.doi.org/10.4156/ijact.vol4.issue15.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hidalgo, Carlos, Myriam Vaca, Mateusz P. Nowak, et al. "Detection, control and mitigation system for secure vehicular communication." Vehicular Communications 34 (April 2022): 100425. http://dx.doi.org/10.1016/j.vehcom.2021.100425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Aramudhan, M., and K. Mohan. "New secure communication protocols for mobile e-health system." i-manager's Journal on Software Engineering 5, no. 1 (2010): 34–39. http://dx.doi.org/10.26634/jse.5.1.1207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Saraireh, Saleh. "A Secure Data Communication System Using Cryptogaphy And Steganography." International journal of Computer Networks & Communications 5, no. 3 (2013): 125–37. http://dx.doi.org/10.5121/ijcnc.2013.5310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Shuai, Wei Sun, Cao-Yuan Ma, Di Wang, and Zheng Chen. "Secure Communication based on a Fractional Order Chaotic System." International Journal of Security and Its Applications 7, no. 5 (2013): 205–16. http://dx.doi.org/10.14257/ijsia.2013.7.5.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Rencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Gang, Niting Cui, and Tianqi Zhang. "Novel Chaos Secure Communication System Based on Walsh Code." Journal of Electrical and Computer Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/649096.

Full text
Abstract:
A multiuser communication scheme which is a hybrid of Walsh code with DCSK and CDSK is proposed to improve low data transmission rate of Differential Chaos Shift Keying (DCSK), poor bit error ratio (BER) performance of Correlation Delay Shift Keying (CDSK), and disadvantage of orthogonality in traditional multiuser DCSK. It not only overcomes the disadvantages of DCSK and CDSK, but also has better performance than CDSK and higher transmission data rate than DCSK. It has been proved that the novel multiuser CDSK-DCSK has better properties than traditional Multiple Input Multiple Output-Differential Chaos Shift Keying (MIMO-DCSK) and Modified-Differential Chaos Shift Keying (M-DCSK). Also the multiuser interference is greatly suppressed due to the orthogonality of Walsh code.
APA, Harvard, Vancouver, ISO, and other styles
45

YANG, TAO, and LEON O. CHUA. "CHAOTIC IMPULSE RADIO: A NOVEL CHAOTIC SECURE COMMUNICATION SYSTEM." International Journal of Bifurcation and Chaos 10, no. 02 (2000): 345–57. http://dx.doi.org/10.1142/s0218127400000220.

Full text
Abstract:
A chaotic impulse radio system is an ultrawide-band communication system that uses a train of very narrow baseband impulses as a carrier. In the transmitter of a chaotic impulse radio system, a message signal is modulated by two kinds of pulse carriers. Firstly, a frequency modulation is used to modulate the message signal into a subcarrier that functions as the clock pulses of a chaotic circuit. Driven by the modulated clock pulses, the chaotic circuit outputs a chaotic impulse positioning sequence which generates the positions of the carrier impulses. The specially designed chaotic circuit in the transmitter guarantees that the time intervals between the carrier impulses are chaotic. Thus the energy of the impulse carrier is distributed evenly over the entire bandwidth. In the receiver of a chaotic impulse radio system the message signal is demodulated in two stages. At the first stage, the time interval between two consecutive impulses is recovered. At the second stage, a simple algorithm based on the knowledge of the chaotic circuit in the transmitter is used to calculate partially the locations of the inner clock pulses which in turn are used to demodulate the message signal. No synchronization at any level is needed in this chaotic impulse radio system. The security of this chaotic impulse radio system depends on the hardware parameters of the chaotic circuit and the inner clock pulse train. Simulation results are presented to illustrate the design procedure of an example of this chaotic impulse radio system.
APA, Harvard, Vancouver, ISO, and other styles
46

Jameel, A., M. Y. Siyal, and N. Ahmed. "Transform-domain and DSP based secure speech communication system." Microprocessors and Microsystems 31, no. 5 (2007): 335–46. http://dx.doi.org/10.1016/j.micpro.2006.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Deng, Jun, Rongqing Zhang, Lingyang Song, Zhu Han, and Bingli Jiao. "Truthful Mechanisms for Secure Communication in Wireless Cooperative System." IEEE Transactions on Wireless Communications 12, no. 9 (2013): 4236–45. http://dx.doi.org/10.1109/twc.2013.080113.120260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yang, Dana, Seohee Yoo, Inshil Doh, and Kijoon Chae. "Selective blockchain system for secure and efficient D2D communication." Journal of Network and Computer Applications 173 (January 2021): 102817. http://dx.doi.org/10.1016/j.jnca.2020.102817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Su, Ke, and Bo Jia. "A novel fiber audio transmission system for secure communication." Optoelectronics Letters 1, no. 3 (2005): 188–90. http://dx.doi.org/10.1007/bf03033839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Álvarez, G., F. Montoya, M. Romera, and G. Pastor. "Cryptanalyzing a discrete-time chaos synchronization secure communication system." Chaos, Solitons & Fractals 21, no. 3 (2004): 689–94. http://dx.doi.org/10.1016/j.chaos.2003.12.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography