Academic literature on the topic 'Wireless communication systems. Computer security. Data encryption (Computer science)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless communication systems. Computer security. Data encryption (Computer science).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"

1

Amira, Abbes, Mazen A. R. Saghir, Naeem Ramzan, Christos Grecos, and Florian Scherb. "A Reconfigurable Wireless Environment for ECG Monitoring and Encryption." International Journal of Embedded and Real-Time Communication Systems 4, no. 3 (2013): 72–87. http://dx.doi.org/10.4018/ijertcs.2013070104.

Full text
Abstract:
Connected health is the convergence of medical devices, security devices, and communication technologies. It enables patients to be monitored and treated remotely from their home or primary care facility rather than attend outpatient clinics or be admitted to hospital. Patients’ data and medical records within a connected health system should be securely transmitted and saved for further analysis and diagnosis. This paper presents a reconfigurable wireless system for electrocardiogram (ECG) monitoring which can be deployed in a connected health environment. Efficient field programmable gate ar
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Mahmood Ali, and Khamees Khalaf Hasan. "Data Compression and Encryption for Remote Sensor Networks Using Different Techniques Methods." Journal of Cases on Information Technology 23, no. 2 (2021): 39–49. http://dx.doi.org/10.4018/jcit.20210401.oa4.

Full text
Abstract:
Wireless sensor networks (WSNs) are widely used for the different multimedia applications in which the data in multimedia form (e.g., images and videos) are captured by visual sensors and transmitted to base stations or destination nodes, and such networks, commonly called wireless multimedia sensor networks (WMSN), transmit high-quality images over sensor nodes with image quality improvement and CS technique while the security of CS data is achieved. The one-way DF-based cooperative digital image transmission model over WSNs using advanced terminologies for image compression called advanced J
APA, Harvard, Vancouver, ISO, and other styles
3

Song, JinGyo, and Seog Chung Seo. "Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers." Applied Sciences 11, no. 6 (2021): 2548. http://dx.doi.org/10.3390/app11062548.

Full text
Abstract:
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks. Since this wireless communication is vulnerable to hackers via data leakage during communication, the transmitted data should be encrypted through block ciphers to protect the data during communication. In addition, in order to encrypt the massive amounts of data securely, it is essential to apply one of secure mode of operation. Among them, CTR (CounTeR) mode is the most widely used in industrial applications. However, these
APA, Harvard, Vancouver, ISO, and other styles
4

Selvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.

Full text
Abstract:
Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt
APA, Harvard, Vancouver, ISO, and other styles
5

Alrikabi, Haider Th Salim, and Hussein Tuama Hazim. "Enhanced Data Security of Communication System Using Combined Encryption and Steganography." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (2021): 144. http://dx.doi.org/10.3991/ijim.v15i16.24557.

Full text
Abstract:
<h2>Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems. Therefore, for various security reasons, we use various methods to save as much as possible on this data, regardless of its different forms, texts, pictures, videos, etc. In this paper, we mainly rely on storing the basic image which should be protected in another image after changing its formal to composites using the DWT wavelet transform. The process of zeroing sites and storing their conten
APA, Harvard, Vancouver, ISO, and other styles
6

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the ent
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Huawei, Ye Li, Yingnan Jiao, and Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.

Full text
Abstract:
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks. The outsourced attribute-based encryption scheme is convinced to be very suitable for secure device-to-device communication since it allows not only fine-grained sharing of encrypted data but also achieves high efficiency in the decryption of general attribute-based encryption schemes. However, almost all existing outsourced attribute-based encryption schemes can hardly be applied directly in the device-to-device
APA, Harvard, Vancouver, ISO, and other styles
8

Marzog, Heyam A., Marwa Jaleel Mohsin, and Mohammed Azher Therib. "Chaotic systems with pseudorandom number generate to protect the transmitted data of wireless network." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1602. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1602-1610.

Full text
Abstract:
<span>Communication techniques have witnessed rapid development in recent years, especially the internet and the mobile network, which led to rapid data transmission. The latest developments, in turn, have come out with advanced decisions to secure information from eavesdropping. Myriad in-depth studies in cryptography. It was implemented with the intention of proposing a revolutionary solution to protect data by encryption techniques, tend maps, and logistics. This work had proposed a new design to the generator of pseudo-random numbers (GPRN) which had utilized multi chaotic systems. S
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (2020): 5777. http://dx.doi.org/10.3390/en13215777.

Full text
Abstract:
In Wireless Sensor Networks (WSNs), server clusters, and other systems requiring secure transmission, the overhead of data encryption and transmission is often not negligible. Unfortunately, a conflict exists between security and efficiency in processing data. Therefore, this paper proposes a strategy to overcome this conflict, called Client-Aware Negotiation for Secure and Efficient Data Transmission (CAN-SEAT). This strategy allows a client with different security transmission requirements to use the appropriate data security transmission without modifying the client. Two methods are designe
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yinghui, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, and Qinglan Zhao. "Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing." Security and Communication Networks 2018 (September 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/9081814.

Full text
Abstract:
The rapid advancements in the Internet of Things (IoT) and cloud computing technologies have significantly promoted the collection and sharing of various data. In order to reduce the communication cost and the storage overhead, it is necessary to exploit data deduplication mechanisms. However, existing data deduplication technologies still suffer security and efficiency drawbacks. In this paper, we propose two secure data deduplication schemes based on Rabin fingerprinting over wireless sensing data in cloud computing. The first scheme is based on deterministic tags and the other one adopts ra
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"

1

Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-05052008-110318/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ng, Ching Yu. "Contributions to security in wireless ad-hoc networks." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060320.153622/index.html.

Full text
Abstract:
Thesis (M.Comp.Sc.)--University of Wollongong, 2005.<br>Typescript. This thesis is subject to a 6 month embargo (12/12/05 to 12/06/06) and may only be viewed and copied with the permission of the author. For further information please Contact the Archivist. Includes bibliographical references: leaf 65-72.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ke, and 黃岢. "Designing authenication scheme for wireless sensor networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Walter. "Proposta de implementação de uma arquitetura para a Internet de nova geração." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259643.

Full text
Abstract:
Orientadores: Mauricio Ferreira Magalhães, Fabio Luciano Verdi<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e Computação<br>Made available in DSpace on 2018-08-09T14:41:11Z (GMT). No. of bitstreams: 1 Wong_Walter_M.pdf: 1265045 bytes, checksum: 15a2435e5676b973ffe726e4757323e4 (MD5) Previous issue date: 2007<br>Resumo: A concepção original da arquitetura da Internet foi baseada em uma rede fixa e confiável. Hoje em dia, a Internet se tornou dinâmica e vulnerável aos ataques de segurança. Também não era prevista a necessidade de integração de
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Ke. "Designing authenication scheme for wireless sensor networks." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Compton-Drake, Lynsey Elizabeth. "A lightweight key distribution mechanism for wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/L_CDrake_053009.pdf.

Full text
Abstract:
Thesis (M.S. in computer engineering)--Washington State University, May 2009.<br>Title from PDF title page (viewed on Aug. 5, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 29-31).
APA, Harvard, Vancouver, ISO, and other styles
8

Gastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.

Full text
Abstract:
Chaotic dynamics are at the center of multiple studies to perfect encrypted communication systems. Indeed, the particular time evolution nature of chaotic signals constitutes the fundamentals of their application to secure telecommunications. The pseudo random signal constitutes the carrier wave for the communication. The information coded on the carrier wave can be extracted with knowledge of the system dynamic evolution law. This evolution law consists of a second-order delay differential equation in which intervene the various parameters of the physical system setup. The set of precise par
APA, Harvard, Vancouver, ISO, and other styles
9

Naik, Vinayak Shashikant. "Reliable and secure data transport in large scale wireless networks of embedded devices." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1154092710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cubukcu, Ilkay Yasinsac Alec. "Formally evaluating wireless security protocols." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-04092005-170554.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2005.<br>Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 7, 2005). Document formatted into pages; contains x, 149 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"

1

Ardagna, Claudio A. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yan. Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Trusted platform module basics: Using TPM in embedded systems. Elsevier Newnes, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

MobiSec 2009 (2009 Turin, Italy). Security and privacy in mobile information and communication systems: First international ICST conference, MOBISEC 2009, Turin, Italy, June 3-5, 2009, revised selected papers. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Joaquim, Filipe, and Obaidat Mohammad S. 1952-, eds. E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seth, Fogie, ed. Maximum wireless security. Sams, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peikari, Cyrus. Maximum Wireless Security. Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"

1

Dhasarathan, Chandramohan, Shanmugam M., Shailesh Pancham Khapre, Alok Kumar Shukla, and Achyut Shankar. "Blockchain-Enabled Decentralized Reliable Smart Industrial Internet of Things (BCIIoT)." In Advances in Computer and Electrical Engineering. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3375-8.ch013.

Full text
Abstract:
The development of wireless communication in the information technological era, collecting data, and transfering it from unmanned systems or devices could be monitored by any application while it is online. Direct and aliveness of countless wireless devices in a cluster of the medium could legitimate unwanted users to interrupt easily in an information flow. It would lead to data loss and security breach. Many traditional algorithms are effectively contributed to the support of cryptography-based encryption to ensure the user's data security. IoT devices with limited transmission power constraints have to communicate with the base station, and the data collected from the zones would need optimal transmission power. There is a need for a machine learning-based algorithm or optimization algorithm to maximize data transfer in a secure and safe transmission.
APA, Harvard, Vancouver, ISO, and other styles
2

Torres, Jenny, Michele Nogueira, and Guy Pujolle. "Identity-Based Cryptography." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch020.

Full text
Abstract:
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more practical and that consider the characteristics of emerging network paradigms, such as wireless communication, device constraints and mobility. Identity-Based Cryptography (IBC) is an asymmetric key cryptographic technology that employs as user’s public key any unique information related to the identity of the user. IBC efficiently manages keying material and provides an easy way to issue a pair of keys applying user information. However, it assumes the existence of a Trusted Third Party (TTP), called Private Key Generator (PKG), which is responsible for generating the corresponding user private key. Relying on a TTP and using an identity as the base of the scheme result in different weaknesses on the system, as the inherent key escrow problem. This chapter investigates those weaknesses, and it points out the stat-of-the-art of proposed solutions to avoid them. This chapter also provides an overview of Identity-Based Encryption (IBE), Identity-Based Signature (IBS) and Identity-Based Key Agreement (IBKA), emphasizing IBE due to being an open problem for many years. This chapter concludes highlighting IBC applications and future trends.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!