Academic literature on the topic 'Security of ADS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of ADS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security of ADS"

1

Lubbe, Heinke, Rudi Serfontein, and Marijke Coetzee. "Assessing the Effectiveness of ADS-B Mitigations." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 535–44. http://dx.doi.org/10.34190/iccws.19.1.2032.

Full text
Abstract:
The rise in aerial traffic necessitates aircraft localisation methods that go beyond radar technology's built-in capabilities. The Automated Dependent Surveillance-Broadcast (ADS-B) system is a novel aircraft localisation method that promises to provide the necessary precision to handle the current air traffic surge. The Federal Aviation Administration has, therefore, enforced ADS-B's deployment. However, the architecture of the ADS-B system holds several vulnerabilities. Most of these vulnerabilities are because ADS-B is designed to rely on wireless networks. This paper provides an in-depth a
APA, Harvard, Vancouver, ISO, and other styles
2

Habibi Markani, Jamal, Abdessamad Amrhar, Jean-Marc Gagné, and René Jr Landry. "Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes." Applied Sciences 13, no. 5 (2023): 3105. http://dx.doi.org/10.3390/app13053105.

Full text
Abstract:
In the next generation modernization plan, the automatic dependent surveillance-broadcast (ADS-B) system plays a pivotal role. However, the ADS-B’s low level of security and its vulnerabilities have raised valid concerns. The main objectives of this paper are to highlight the limitations of legacy ADS-B systems and to assess the feasibility of using Format-preserving (F), Feistel-based encryption (F), with multiple implementation variances (X) (FFX) algorithms, for enhancing ADS-B’s security. The offered solution is implemented in a standard software-defined radio (SDR) ADS-B to be utilized in
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Waqas, Ammar Masood, Jawad Manzoor, and Sedat Akleylek. "Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture." PeerJ Computer Science 11 (June 9, 2025): e2886. https://doi.org/10.7717/peerj-cs.2886.

Full text
Abstract:
Automatic Dependent Surveillance-Broadcast (ADS-B) is a vital communication protocol within air traffic control (ATC) systems. Unlike traditional technologies, ADS-B utilizes the Global Positioning System (GPS) to deliver more accurate and precise location data while reducing operational and deployment costs. It enhances radar coverage and serves as a standalone solution in areas lacking radar services. Despite these advantages, ADS-B faces significant security vulnerabilities due to its open design and the absence of built-in security features. Given its critical role, developing an advanced
APA, Harvard, Vancouver, ISO, and other styles
4

Patre, Ms Devyani. "Design of Security Framework for Ads-B Based Systems." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 274–77. http://dx.doi.org/10.22214/ijraset.2017.3049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kožović, Dejan, and Dragan Đurđević. "Spoofing in aviation: Security threats on GPS and ADS-B systems." Vojnotehnicki glasnik 69, no. 2 (2021): 461–85. http://dx.doi.org/10.5937/vojtehg69-30119.

Full text
Abstract:
Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the "victim's" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Method
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Rong Shun, Hao Miao Yang, and Hong Gang Wu. "Enabling Confidentiality for ADS-B Broadcast Messages Based on Format-Preserving Encryption." Applied Mechanics and Materials 543-547 (March 2014): 2032–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2032.

Full text
Abstract:
The automatic dependent surveillance-broadcast (ADS-B) system is the backbone of the next-gen air traffic control (ATC) modernization plan. Unfortunately, ADS-B system suffers from serious cyber-security vulnerabilities due to the open broadcast of aircraft data, without regard to message confidentiality. However, using common encryption scheme to provide confidentiality of ADS-B data is not a good solution, because encrypting data with ordinary cryptosystem would violate the original openness intention of ADS-B system design. In this paper, based on the new format-preserving encryption (FPE),
APA, Harvard, Vancouver, ISO, and other styles
7

Kožović, Dejan, Dragan Đurđević, Mirko Dinulović, Saša Milić, and Boško Rašuo. "Air traffic modernization and control: ADS-B system implementation update 2022: A review." FME Transactions 51, no. 1 (2023): 117–30. http://dx.doi.org/10.5937/fme2301117k.

Full text
Abstract:
Automatic Dependent Surveillance-Broadcast (ADS-B) is a multiparameter surveillance system designed to improve key segments of air traffic: enabling real-time surveillance, raising safety and efficiency levels, and improving flight information and weather services. ADS-B consists of two subsystems, ADS-B Out and ADS-B In. Although only a complete system, ADS-B In/Out provides numerous benefits (additional situational awareness, more efficient oceanic routing, etc.) FAA and EASA only require ADS-B Out (by January and June 2020, respectively), whereby ADS-B In remains optional. Because of its ma
APA, Harvard, Vancouver, ISO, and other styles
8

Septiawan, Reza, I. Made Astawa, Arief Rufiyanto, and Tahar Agastani. "Metode Deteksi ‘Potential Security Threats’ Pada ADS-B Data dengan Memonitor EM Emisi Radiasi pada Jaringan Ethernet." Ultima Computing : Jurnal Sistem Komputer 11, no. 1 (2019): 39–44. http://dx.doi.org/10.31937/sk.v11i1.1181.

Full text
Abstract:
Precision, Navigation, and Timing (PNT) system based on Global Navigation Satellite System (GNSS) becomes significant in the air traffic management, especially in the use of Automatic Dependent Surveillance Broadcast system (ADS-B) for air traffic monitoring. Therefore the integrity of GNSS is significant to provide a reliable data necessary for ADS-B. GNSS Interference due to intentional or unintentional surrounding signal source may decrease the integrity of GNSS signal and therefore may result in the in-accurate position data of ADS-B message. ADS-B message itself is also vulnerable from po
APA, Harvard, Vancouver, ISO, and other styles
9

Alghamdi, Fatimah, Amal Alshhrani, and Nermin Hamza. "Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)." International Journal of Computer Applications 180, no. 26 (2018): 23–28. http://dx.doi.org/10.5120/ijca2018916598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Yoohwan, Ju-Yeon Jo, and Sungchul Lee. "ADS-B vulnerabilities and a security solution with a timestamp." IEEE Aerospace and Electronic Systems Magazine 32, no. 11 (2017): 52–61. http://dx.doi.org/10.1109/maes.2018.160234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security of ADS"

1

Miah, Abdul. "Product-based environmental metrics for use within aerospace, defence, space and security industries (ADS)." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845983/.

Full text
Abstract:
Within the aerospace, defence, space, and security (ADS) industries, there is a growing reporting requirement and interest in understanding and reducing the environmental impacts of products and related risks to business. This dissertation presents the research carried out in collaboration with six ADS companies (ADS Group, Airbus Group, BAE Systems, Bombardier Aerospace, Granta Design, and Rolls-Royce) to establish industry methods for consistently measuring and reporting two pre-selected product-based environmental indicators identified as important to the industry: energy consumption and ac
APA, Harvard, Vancouver, ISO, and other styles
2

Wahlgren, Alex, and Joakim Thorn. "Detecting ADS-B spoofing attacks : using collected and simulated data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179040.

Full text
Abstract:
In a time where general technology is progressing at a rapid rate, this thesis aims to present possible advancements to security in regard to air traffic communication. By highlighting how data can be extracted using simple hardware and open-source software the transparency and lack of authentication is showcased. The research is specifically narrowed down to discovering vulnerabilities of the ADS-B protocol in order to apply countermeasures. Through fetching live aircraft data with OpenSky-Network and through fetching simulated ADS-B attack data with OpenScope, this thesis develops a data set
APA, Harvard, Vancouver, ISO, and other styles
3

Chi, Lijun. "Security and Robustness of Autonomous Driving Systems Against Physical Adversarial Attack." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT009.

Full text
Abstract:
Grâce à des mises à jour matérielles itératives et aux avancées dans les réseaux neuronaux profonds (DNN), les systèmes de conduite autonome (ADS) sont de plus en plus intégrés à la vie quotidienne. Cependant, avant que cette technologie ne se généralise, un problème de sécurité qui doit être résolu est celui des attaques adversariales physiques. Ces attaques peuvent manipuler des objets réels pour perturber la perception des ADS et provoquer des accidents de la route. De plus, la diversité des attaques physiques complique la tâche des défenseurs passifs.Cette étude aborde ces défis en analysa
APA, Harvard, Vancouver, ISO, and other styles
4

Shankaran, Rajan. "Asynchronous transfer mode security /." View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030616.142410/index.html.

Full text
Abstract:
Thesis (M. Sc.) (Hons.) -- University of Western Sydney, Nepean, 1999.<br>Thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Honors) from the University of Western Sydney, Nepean, School of Computing and Information Technology. Bibliography : p. 87-88.
APA, Harvard, Vancouver, ISO, and other styles
5

Mead, Jonathan, and mikewood@deakin edu au. "The Australia-Indonesia security relationship." Deakin University. School of International and Political Studies, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051017.144017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alach, Zachary James. "Mapping the elements of physical security towards the creation of a holistic physical security model." Connect to thesis, 2007. http://portal.ecu.edu.au/adt-public/adt-ECU2007.0034.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.

Full text
Abstract:
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003.<br>"A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
APA, Harvard, Vancouver, ISO, and other styles
8

Kong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kazi, Mazharul Haque. "Systematic risk factors in Australian security pricing /." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050913.105500/index.html.

Full text
Abstract:
Thesis (Ph.D.) -- University of Western Sydney, 2004.<br>"A thesis submitted in fulfilment of requirements for the degree of Doctor of Philosophy in Economics and Finance" Bibliography : leaves 211-226.
APA, Harvard, Vancouver, ISO, and other styles
10

Parnell, Winsome R., and n/a. "Food security in New Zealand." University of Otago. Department of Human Nutrition, 2005. http://adt.otago.ac.nz./public/adt-NZDU20070426.162526.

Full text
Abstract:
There was growing concern in New Zealand in the 1990�s that Food Security: access by all people at all times to enough food for an active healthy life, was not being achieved, despite an abundant food supply. A study of a convenience sample of 40 families with children (58 adults and 92 children) whose sole income was a government welfare benefit was undertaken. Two-thirds of these households regularly relied on a limited variety of food; one-half did not have a sufficient amount of food because of lack of money and outstanding debts. Over the previous year two-thirds had sourced food from a f
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security of ADS"

1

Vollmert, Robert. ADP security at NRL. Naval Research Laboratory, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Telecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Veterans Administration, Office of Data Management and Telecommunications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

UNDP South East Asia HIV and Development Project, ed. HIV subverts national security. UNDP South East Asia HIV and Development Project, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. National Aeronautics and Space Administration., ed. Integrity and security in an Ada runtime environment. Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baker, Dean. Saving Social Security with stocks: The promises don't add up. Twentieth Century Fund, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Regional Centre for Strategic Studies (Colombo, Sri Lanka), ed. HIV/AIDS as a security threat to India. Manohar Publishers & Distributors, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Toptygin, Alekseĭ. Zapreshchennyĭ Berii︠a︡: Geniĭ gosbezopasnosti ili ischadie ada? ĖKSMO, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Trust, SAPES, ed. HIV/AIDS and food security. SAPES Trust, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harmoko. Kopi pagi bersama Harmoko: Ada bom waktu. Gria Media Prima, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security of ADS"

1

Yang, Haomiao, Hongwei Li, and Xuemin Sherman Shen. "Complete ADS-B Security Solution." In Secure Automatic Dependent Surveillance-Broadcast Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07021-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Tengyao, Buhong Wang, Fute Shang, Jiwei Tian, and Kunrui Cao. "ADS-B Data Attack Detection Based on Generative Adversarial Networks." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kantzavelou, Ioanna, and Ahmed Patel. "An attack detection system for secure computer systems - Design of the ADS." In Information Systems Security. Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kao, Da-Yu, and Yuan-Pei Chan. "Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Penwell, Tasha. "Why Do I Care About Security?" In Beginning AWS Security. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9681-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Penwell, Tasha. "Who Is Responsible Again?" In Beginning AWS Security. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9681-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Penwell, Tasha. "Is This the End?" In Beginning AWS Security. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9681-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Penwell, Tasha. "Security Is Not Built in a Day." In Beginning AWS Security. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9681-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Penwell, Tasha. "How Do I Build a Secure Architecture?" In Beginning AWS Security. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9681-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vijayakumar, Thurupathan. "API Security." In Practical API Architecture and Development with Azure and AWS. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3555-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security of ADS"

1

Zhao, Ying, Yi Zhu, Li Zhao, Zexin Li, and Chan Yin. "ADS Modeling and Safety Verification in Extreme Driving Scenarios." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sarma, Nilotpola, E. Bhawani Eswar Reddy, and Chandan Karfa. "Security Concerns of Machine Learning Hardware." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mangin, Jérémy, Koroush Shirvan, Jeong Lee, and Neil Todreas. "Consequence-Based Security for a Low Enriched UO2 Fueled Microreactor." In Advanced Reactor Safety (ARS). American Nuclear Society, 2024. http://dx.doi.org/10.13182/t130-43321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Hyunseok, and Sarit Mukherjee. "Zeta: Transparent Zero-Trust Security Add-on for RDMA." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mukherjee, Rijoy, Sneha Swaroopa, and Rajat Subhra Chakraborty. "Security Vulnerabilities in AI Hardware: Threats and Countermeasures." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ithal, Niranjana J., Natarajan Adharsh, Anurup P, and K. Sudeendra Kumar. "A Complete Security Protocol To Safeguard IJTAG Architecture." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eggers, Shannon, and Robert Youngblood. "Digital Risk Analysis in Nuclear Engineering Projects: Designing for Safety, Performance, Reliability, and Security." In Advanced Reactor Safety (ARS). American Nuclear Society, 2024. http://dx.doi.org/10.13182/t130-43314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brandi, Wesley, Brendan Kitts, Raj Mahato, and Jing Ying Zhang. "Armored ads." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Finke, Cindy, Jonathan Butts, and Robert Mills. "ADS-B encryption." In the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM Press, 2013. http://dx.doi.org/10.1145/2459976.2459986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jagadish, P., and Anjan K. Koundinya. "Social Media Ads Analysis." In 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS). IEEE, 2021. http://dx.doi.org/10.1109/fabs52071.2021.9702575.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security of ADS"

1

Reed, Nick. PPR2016 Automated Vehicle Safety Assurance - In-use Safety and Security Monitoring - Task 1: Road Incident Taxonomy. TRL, 2022. http://dx.doi.org/10.58446/mvuc1823.

Full text
Abstract:
This report describes possible approaches to capture and categorise safety events involving low speed automated vehicles (LSAVs) as a means to provide the public with better evidence over their safety, regulators with evidence to strengthen decision-making in relation to LSAV operations, and developers with data to help improve the safety of LSAV behaviours. it is proposed that by recording safety events and road rule violations across a range of severities, considering event causation, including factors outside the ADS, reviewing external evidence, exploring the range of factors that contribu
APA, Harvard, Vancouver, ISO, and other styles
2

Baldwin, David S., and Tami Biddle. AIDS and National Security. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada413446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Melton, R. ADP Security Plan, Math Building, Room 1139. Office of Scientific and Technical Information (OSTI), 1985. http://dx.doi.org/10.2172/79006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brauer, F. P. ADP security plan, 320 Building, Room 110. Office of Scientific and Technical Information (OSTI), 1985. http://dx.doi.org/10.2172/10121000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saylors, Eric. Quantifying a Negative: How Homeland Security Adds Value. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1009228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holt, J. G., and J. D. Fluckiger. Approval of revised ADP security plan: National Security Technology, ROB/1401 and 1403. Office of Scientific and Technical Information (OSTI), 1985. http://dx.doi.org/10.2172/31375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hendrick, Stephen, and Ashwin Ramaswami. Maintainer Perspectives on Open Source Software Security: Survey-based Insights from Maintainers Regarding How They Address Best Practices for Secure Software Development. The Linux Foundation, 2023. https://doi.org/10.70828/pvsn3075.

Full text
Abstract:
The security of open source software is so often a primary concern in this community, and maintainers play a crucial role in this endeavour by securing the health and sustainability of open source software. As we look to build out tooling and practices that increase software security, how do we make sure that these tools empower maintainers, and not add additional burden? This research tackles this question, surveying the practices, challenges, and expectations of maintainers across the open source community. This study used data collected from interviews with subject matter experts as well as
APA, Harvard, Vancouver, ISO, and other styles
8

Johnston, B. L. Addendum, automatic data processing (ADP) security plan, Revision 1. ADP facility number: PNL-63. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/10118490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McGrew, D., and D. Bailey. AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chown, P. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!