Journal articles on the topic 'Secure Real-Time Protocol (SRTP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Real-Time Protocol (SRTP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
H.G., Shashidhar, Sanket Dessai, and Shilpa Chaudhari. "Design of Secure Transmission of Multimedia Data Using SRTP on Linux Platform." International Journal of Reconfigurable and Embedded Systems (IJRES) 4, no. 2 (July 1, 2015): 71. http://dx.doi.org/10.11591/ijres.v4.i2.pp71-81.
Full textPrastiawan, Hendra. "Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP." Jurnal Telekomunikasi dan Komputer 5, no. 3 (February 27, 2017): 205. http://dx.doi.org/10.22441/incomtech.v5i3.1141.
Full textLiu, Chun, and Kun Tan. "Research and Implementation of the Secure Database-Update Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1752.
Full textYingyuan, Xiao, Liu Yunsheng, and Chen Xiangyang. "An efficient secure real-time concurrency control protocol." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1899–902. http://dx.doi.org/10.1007/bf02831902.
Full textLee, Sungyoung, Byeong-Soo Jeong, and Hyon-Woo Seung. "A secure dynamic copy protocol in real-time secure database systems." ACM SIGPLAN Notices 34, no. 7 (July 1999): 73–79. http://dx.doi.org/10.1145/315253.314452.
Full textAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Full textChanjung Park, Seog Park, and S. H. Son. "Multiversion locking protocol with freezing for secure real-time database systems." IEEE Transactions on Knowledge and Data Engineering 14, no. 5 (September 2002): 1141–54. http://dx.doi.org/10.1109/tkde.2002.1033780.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textAhmed, Adel Ali, and Norsheila Fisal Fisal. "Secure real-time routing protocol with load distribution in wireless sensor networks." Security and Communication Networks 4, no. 8 (May 25, 2010): 839–69. http://dx.doi.org/10.1002/sec.214.
Full textKim, Namgyu, Songchun Moon, and Yonglak Sohn. "Secure one snapshot protocol for concurrency control in real-time stock trading systems." Journal of Systems and Software 73, no. 3 (November 2004): 441–54. http://dx.doi.org/10.1016/j.jss.2003.08.236.
Full textSon, Sang H., Rasikan David, and Craig W. Chaney. "Design and analysis of an adaptive policy for secure real-time locking protocol." Information Sciences 99, no. 1-2 (June 1997): 101–35. http://dx.doi.org/10.1016/s0020-0255(96)00281-2.
Full textWan, Changsheng, Juan Zhang, and Daoli Huang. "SCPR: Secure Crowdsourcing-Based Parking Reservation System." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1076419.
Full textSirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textKim, Young-Jin, and Marina Thottan. "SGTP: Smart Grid Transport Protocol for secure reliable delivery of periodic real time data." Bell Labs Technical Journal 16, no. 3 (November 22, 2011): 83–99. http://dx.doi.org/10.1002/bltj.20523.
Full textBi, Jia Na, and E. Xu. "A Secure and Energy-Efficient Rooting Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 1699–704. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1699.
Full textKamboj, Nippun, Dalip, and Munishwar Rai. "A New Secure Ad-Hoc on Demand Distance Vector Routing Protocol to Ensure Less Power Consumption in Mobile Ad-Hoc Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2483–87. http://dx.doi.org/10.1166/jctn.2020.8919.
Full textPratama, Redo, Mira Orisa, and FX Ariwibisono. "APLIKASI MONITORING DAN CONTROLLING SERVER MENGGUNAKAN PROTOCOL ICMP (INTERNET CONTROL MESSAGE PROTOCOL) DAN SSH (SECURE SHELL) BERBASIS WEBSITE." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 1 (September 1, 2020): 397–403. http://dx.doi.org/10.36040/jati.v4i1.2310.
Full textSeo, Minhye. "Fair and Secure Multi-Party Computation with Cheater Detection." Cryptography 5, no. 3 (August 12, 2021): 19. http://dx.doi.org/10.3390/cryptography5030019.
Full textZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Full textTan, Haowen, Dongmin Choi, Pankoo Kim, Sungbum Pan, and Ilyong Chung. "Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/7978027.
Full textArshadi, Nasser. "Blockchain Platform for Real-Time Payments: A Less Costly and More Secure Alternative to ACH." Technology & Innovation 21, no. 1 (October 31, 2019): 3–9. http://dx.doi.org/10.21300/21.1.2019.3.
Full textLekbich, Anass, Abdelaziz Belfqih, Chaimae Zedak, Jamal Boukherouaa, and F. Elmariami. "Implementation of a decentralized real-time management system for electrical distribution networks using the internet of things in smart grids." Bulletin of Electrical Engineering and Informatics 10, no. 3 (June 1, 2021): 1142–53. http://dx.doi.org/10.11591/eei.v10i3.2436.
Full textYu, SungJin, JoonYoung Lee, YoHan Park, YoungHo Park, SangWoo Lee, and BoHeung Chung. "A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks." Applied Sciences 10, no. 10 (May 21, 2020): 3565. http://dx.doi.org/10.3390/app10103565.
Full textHaseeb, Khalid, Naveed Islam, Yasir Javed, and Usman Tariq. "A Lightweight Secure and Energy-Efficient Fog-Based Routing Protocol for Constraint Sensors Network." Energies 14, no. 1 (December 26, 2020): 89. http://dx.doi.org/10.3390/en14010089.
Full textChandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.
Full textShehada, Dina, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al Qutayri, Yousof Al Hammadi, Ernesto Damiani, and Jiankun Hu. "BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications." Security and Communication Networks 2017 (2017): 1–18. http://dx.doi.org/10.1155/2017/3606424.
Full textBi, Jia Na, and E. Xu. "An Energy-Efficient Attack Detection Protocol for WSN." Applied Mechanics and Materials 380-384 (August 2013): 2716–19. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2716.
Full textShen, Chaowen. "Design and Realization of Video Signals Encryption and Decryption via Chaotic Sequence." MATEC Web of Conferences 228 (2018): 02006. http://dx.doi.org/10.1051/matecconf/201822802006.
Full textNi, Zhen Tao, Ying Zhong, and Lei Huang. "Research on Secure Model in WiFi/WiMAX Mixed Networks Based on Pre-Authentication." Applied Mechanics and Materials 644-650 (September 2014): 2988–91. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2988.
Full textÖzkul, Mükremin, Ilir Capuni, and Elton Domnori. "Context-Aware Intelligent Traffic Light Control through Secure Messaging." Journal of Advanced Transportation 2018 (November 5, 2018): 1–10. http://dx.doi.org/10.1155/2018/4251701.
Full textRajabalipanah, Hamid, Kasra Rouhi, Ali Abdolali, Shahid Iqbal, Lei Zhang, and Shuo Liu. "Real-time terahertz meta-cryptography using polarization-multiplexed graphene-based computer-generated holograms." Nanophotonics 9, no. 9 (June 29, 2020): 2861–77. http://dx.doi.org/10.1515/nanoph-2020-0110.
Full textDang, Lanjun, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, and Xiaotong Fu. "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877254. http://dx.doi.org/10.1177/1550147718772545.
Full textGope, Prosanta, Ashok Kumar Das, Neeraj Kumar, and Yongqiang Cheng. "Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks." IEEE Transactions on Industrial Informatics 15, no. 9 (September 2019): 4957–68. http://dx.doi.org/10.1109/tii.2019.2895030.
Full textKRAVTSOV, Alexey, Vasily ANISCHENKO, Victor ATRUSHKEVICH, and Ivan PYTALEV. "PERSPECTIVES OF APPLYING WEBRTC FOR REMOTE-CONTROLLED MINING EQUIPMENT." Sustainable Development of Mountain Territories 12, no. 4 (December 30, 2020): 592–99. http://dx.doi.org/10.21177/1998-4502-2020-12-4-592-599.
Full textSalem, Fatty M., Maged Hamada Ibrahim, and I. I. Ibrahim. "Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle-to-Roadside Communication Networks." International Journal of Vehicular Technology 2012 (November 13, 2012): 1–8. http://dx.doi.org/10.1155/2012/862368.
Full text., Deepak, and Rajkumar . "Performance Analysis of ECDSA Based SE-AODV Routing Protocol In VANETS." International Journal of Engineering & Technology 7, no. 3.16 (July 26, 2018): 76. http://dx.doi.org/10.14419/ijet.v7i3.16.16187.
Full textXia, Fei, Zong Ze Xia, Xiao Bo Huang, and Li Song. "Data Acquisition and Control System Based on CAN Open Network." Applied Mechanics and Materials 687-691 (November 2014): 3375–78. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3375.
Full textWu, Tsu-Yang, Zhiyuan Lee, Lei Yang, and Chien-Ming Chen. "A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks." Security and Communication Networks 2021 (June 28, 2021): 1–17. http://dx.doi.org/10.1155/2021/9944460.
Full textShumeiko, Irina, and Andrey Pasechnik. "The Development of Secure Protocol in Smart Technologies for Schema-based One-time Pads Using the System of Near-field Actions." NBI Technologies, no. 1 (August 2019): 31–35. http://dx.doi.org/10.15688/nbit.jvolsu.2019.1.6.
Full textChen, Chang, and Liu. "Light-Weighted Password-Based Multi-Group Authenticated Key Agreement for Wireless Sensor Networks." Applied Sciences 9, no. 20 (October 14, 2019): 4320. http://dx.doi.org/10.3390/app9204320.
Full textSi, Pengbo, Fei Wang, Enchang Sun, and Yuzhao Su. "BEI-TAB: Enabling Secure and Distributed Airport Baggage Tracking with Hybrid Blockchain-Edge System." Wireless Communications and Mobile Computing 2021 (September 23, 2021): 1–12. http://dx.doi.org/10.1155/2021/2741435.
Full textTouil, Hamza, Nabil El Akkad, and Khalid Satori. "Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 59–68. http://dx.doi.org/10.18280/ijsse.110107.
Full textTouil, Hamza, Nabil El Akkad, and Khalid Satori. "Secure and Guarantee QoS in a Video Sequence: a New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-time Exchanges." WSEAS TRANSACTIONS ON COMMUNICATIONS 20 (April 2, 2021): 52–62. http://dx.doi.org/10.37394/23204.2021.20.7.
Full textZhao, R., G. H. Qin, H. P. Chen, J. Qin, and J. Yan. "Security-Aware Scheduling for FlexRay-Based Real-Time Automotive Systems." Mathematical Problems in Engineering 2019 (June 13, 2019): 1–17. http://dx.doi.org/10.1155/2019/4130756.
Full textTaher, Bahaa Hussein, Huiyu Liu, Firas Abedi, Hongwei Lu, Ali A. Yassin, and Alzahraa J. Mohammed. "A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications." Journal of Sensors 2021 (April 27, 2021): 1–18. http://dx.doi.org/10.1155/2021/8871204.
Full textAghili, Seyed, Hamid Mala, and Pedro Peris-Lopez. "Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol." Sensors 18, no. 11 (October 29, 2018): 3663. http://dx.doi.org/10.3390/s18113663.
Full textV, Suma. "SDN Controller and Blockchain to Secure Information Transaction in a Cluster Structure." June 2021 3, no. 2 (July 27, 2021): 147–60. http://dx.doi.org/10.36548/jtcsst.2021.2.006.
Full textChen, Ping, Simin Yu, Baoju Chen, Liangshan Xiao, and Jinhu Lü. "Design and SOPC-Based Realization of a Video Chaotic Secure Communication Scheme." International Journal of Bifurcation and Chaos 28, no. 13 (December 12, 2018): 1850160. http://dx.doi.org/10.1142/s0218127418501602.
Full textAcar, Abbas, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, and Selcuk Uluagac. "A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–28. http://dx.doi.org/10.1145/3464690.
Full textDong, Qingkuan, Jiaqing Tong, and Yuan Chen. "Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/937198.
Full text