Academic literature on the topic 'Secure Networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Networks"
Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.
Full textZhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.
Full textBreeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.
Full textKotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.
Full textMaivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.
Full textShang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.
Full textTamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.
Full textvon Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.
Full textAl-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.
Full textSadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.
Full textDissertations / Theses on the topic "Secure Networks"
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textYiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.
Full textPaul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.
Full textHia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.
Full textLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Full textBellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.
Full textFriji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.
Full textNawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.
Full textMirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.
Full textMehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.
Full textBooks on the topic "Secure Networks"
Preneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.
Full textConti, Mauro. Secure Wireless Sensor Networks. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-3460-7.
Full textJayakody, Dushantha Nalin K., Kathiravan Srinivasan, and Vishal Sharma, eds. 5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03508-2.
Full textBukowski, Lech. Reliable, Secure and Resilient Logistics Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00850-5.
Full textKhan, Jahanzeb. Building Secure Wireless Networks with 802.11. John Wiley & Sons, Ltd., 2003.
Find full textLarry, Caffrey, Okot-Uma Rogers W'O, Commonwealth Secretariat, Commonwealth Network of Information Technology for Development., and International Council for Information Technology in Government Administration., eds. Government secure intranets. Commonwealth Secretariat, 1999.
Find full textVelliangiri, S., M. Gunasekaran, and P. Karthikeyan, eds. Secure Communication for 5G and IoT Networks. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-79766-9.
Full textBook chapters on the topic "Secure Networks"
Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Secure Routing." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_5.
Full textHicks, Michael, and Angelos D. Keromytis. "A Secure Plan." In Active Networks. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48507-0_28.
Full textHerrigel, Alexander, and Xuejia Lai. "Secure IN internetworking." In Intelligent Networks. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34894-0_11.
Full textLuo, Ming-Xing. "Secure Quantum Cloud Computing." In Quantum Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6226-2_7.
Full textShen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Physical Layer Secure Communications." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_2.
Full textKaranastasis, Stelios, and Ahmed Patel. "Security on ATM Networks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_1.
Full textMarkantonakis, Constantinos, and Simeon Xenitellis. "Implementing a Secure Log File Download Manager for the Java Card." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_10.
Full textOppliger, Rolf. "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_11.
Full textAdamson, W. A., C. J. Antonelli, K. W. Coffman, P. McDaniel, and J. Rees. "Secure Distributed Virtual Conferencing." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_12.
Full textHardjono, Thomas, and Brad Cain. "PIM-SM Security: Interdomain Issues and Solutions." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_13.
Full textConference papers on the topic "Secure Networks"
Mas Machuca, Carmen. "Planning Strategy Towards Secure Optical Core Networks." In Photonic Networks and Devices. Optica Publishing Group, 2024. https://doi.org/10.1364/networks.2024.nem1c.4.
Full textSulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.
Full textRahman, Mohammad Saidur, Stephen DiAdamo, Miralem Mehic, and Charles Fleming. "Quantum Secure Anonymous Communication Networks." In 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2024. http://dx.doi.org/10.1109/qcnc62729.2024.00060.
Full textBolgouras, Vaios, Aristeidis Farao, and Christos Xenakis. "Roadmap to Secure 6G Networks." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942738.
Full textGharib, Dr Mohammed. "How to Secure Cooperative UAV Networks?" In 2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT). IEEE, 2024. http://dx.doi.org/10.1109/cpsat64082.2024.10745417.
Full textSanghani, Parth, Sharada Valiveti, and Gaurang Raval. "Secure Data Flow Between Trusted Networks." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859796.
Full textFan-Yuan, Guan-Jie. "High-secure quantum communication and networks." In 2024 IEEE Opto-Electronics and Communications Conference (OECC). IEEE, 2024. https://doi.org/10.1109/oecc54135.2024.10975607.
Full textFioravanti, Camilla, Ernesto Del Prete, and Roberto Setola. "Secure Gossip Algorithm for Industrial Networks." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073443.
Full textBA, Usha, and Aruna S. "Secure Decentralized File Sharing." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872313.
Full textEllis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.
Full textReports on the topic "Secure Networks"
Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textRavishankar, Chinya V., Srikanth Krishnamurthy, Michalis Faloutsos, and Satish Tripathi. Secure Wireless Fault Tolerant Tunable Networks (SWIFT). Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada437661.
Full textPopkov, G. V. Algorithms for designing secure multiservice communication networks. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2023. http://dx.doi.org/10.12731/ofernio.2023.25165.
Full textClark, Paul C., Timothy E. Lavin, Cynthia E. Irvine, and David J. Shifflett. DNS and Multilevel Secure Networks: Architectures and Recommendations. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada498511.
Full textLiu, Donggang. Secure and Robust Clustering in Wireless Sensor Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500585.
Full textDatko, Joshua B. Supporting Secure, AD HOC Joins for Tactical Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403488.
Full textPeterson, Larry, Randy Wang, and Vivek Pai. Building Secure and Reliable Networks Through Robust Resource Scheduling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada436189.
Full textMeseguer, Jose, and Carolyn Talcott. Maude: A Wide Spectrum Language for Secure Active Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada406892.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full text