Academic literature on the topic 'Wireless communication systems. Computer security. Data encryption (Computer science)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless communication systems. Computer security. Data encryption (Computer science).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"
Amira, Abbes, Mazen A. R. Saghir, Naeem Ramzan, Christos Grecos, and Florian Scherb. "A Reconfigurable Wireless Environment for ECG Monitoring and Encryption." International Journal of Embedded and Real-Time Communication Systems 4, no. 3 (2013): 72–87. http://dx.doi.org/10.4018/ijertcs.2013070104.
Full textAhmed, Mahmood Ali, and Khamees Khalaf Hasan. "Data Compression and Encryption for Remote Sensor Networks Using Different Techniques Methods." Journal of Cases on Information Technology 23, no. 2 (2021): 39–49. http://dx.doi.org/10.4018/jcit.20210401.oa4.
Full textSong, JinGyo, and Seog Chung Seo. "Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers." Applied Sciences 11, no. 6 (2021): 2548. http://dx.doi.org/10.3390/app11062548.
Full textSelvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.
Full textAlrikabi, Haider Th Salim, and Hussein Tuama Hazim. "Enhanced Data Security of Communication System Using Combined Encryption and Steganography." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (2021): 144. http://dx.doi.org/10.3991/ijim.v15i16.24557.
Full textNour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.
Full textWang, Huawei, Ye Li, Yingnan Jiao, and Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network." International Journal of Distributed Sensor Networks 15, no. 7 (2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Full textMarzog, Heyam A., Marwa Jaleel Mohsin, and Mohammed Azher Therib. "Chaotic systems with pseudorandom number generate to protect the transmitted data of wireless network." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1602. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1602-1610.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textZhang, Yinghui, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, and Qinglan Zhao. "Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing." Security and Communication Networks 2018 (September 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/9081814.
Full textDissertations / Theses on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"
Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-05052008-110318/.
Full textNg, Ching Yu. "Contributions to security in wireless ad-hoc networks." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060320.153622/index.html.
Full textWang, Ke, and 黃岢. "Designing authenication scheme for wireless sensor networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841732.
Full textLi, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Full textWong, Walter. "Proposta de implementação de uma arquitetura para a Internet de nova geração." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259643.
Full textWang, Ke. "Designing authenication scheme for wireless sensor networks." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841732.
Full textCompton-Drake, Lynsey Elizabeth. "A lightweight key distribution mechanism for wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/L_CDrake_053009.pdf.
Full textGastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.
Full textNaik, Vinayak Shashikant. "Reliable and secure data transport in large scale wireless networks of embedded devices." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1154092710.
Full textCubukcu, Ilkay Yasinsac Alec. "Formally evaluating wireless security protocols." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-04092005-170554.
Full textBooks on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"
Ardagna, Claudio A. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.
Find full textChen, Yan. Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Springer-Verlag Berlin Heidelberg, 2009.
Find full textTrusted platform module basics: Using TPM in embedded systems. Elsevier Newnes, 2006.
Find full textMobiSec 2009 (2009 Turin, Italy). Security and privacy in mobile information and communication systems: First international ICST conference, MOBISEC 2009, Turin, Italy, June 3-5, 2009, revised selected papers. Springer, 2009.
Find full textInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Find full textInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Find full textJoaquim, Filipe, and Obaidat Mohammad S. 1952-, eds. E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Find full textInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Find full textBook chapters on the topic "Wireless communication systems. Computer security. Data encryption (Computer science)"
Dhasarathan, Chandramohan, Shanmugam M., Shailesh Pancham Khapre, Alok Kumar Shukla, and Achyut Shankar. "Blockchain-Enabled Decentralized Reliable Smart Industrial Internet of Things (BCIIoT)." In Advances in Computer and Electrical Engineering. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3375-8.ch013.
Full textTorres, Jenny, Michele Nogueira, and Guy Pujolle. "Identity-Based Cryptography." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch020.
Full text