Gotowa bibliografia na temat „Hybrid Secure Communication”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Hybrid Secure Communication”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Hybrid Secure Communication"

1

Dhall, Sangeeta, Bharat Bhushan, and Shailender Gupta. "An Improved Hybrid Mechanism for Secure Data Communication." International Journal of Computer Network and Information Security 8, no. 6 (2016): 67–79. http://dx.doi.org/10.5815/ijcnis.2016.06.08.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jain, Amrita, and Vivek Kapoor. "Policy for Secure Communication using Hybrid Encryption Algorithm." International Journal of Computer Applications 125, no. 10 (2015): 16–20. http://dx.doi.org/10.5120/ijca2015906035.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.

Pełny tekst źródła
Streszczenie:
In order to solve the problems of identity solidification, key duration, and lack of anonymity in communications between unmanned aerial vehicles (UAVs) and ground control stations (GCSs), a mutual secure communication scheme named Dynamic Identity and Hybrid Encryption is proposed in this paper. By constructing an identity update mechanism and a lightweight hybrid encryption system, the anonymity and untraceability of the communicating parties can be realized within a resource-limited environment, and threats such as man-in-the-middle (MITM) attacks, identity forgery, and message tampering ca
Style APA, Harvard, Vancouver, ISO itp.
4

Sristi J, Andrew Vivan X, A Ashoka, Y B Tulasi, and Dr. Manjunath C R. "Software Based Implementation of a Hybrid Quantum Secure Cryptosystem for Secure Communication and Data Protection." International Journal on Smart & Sustainable Intelligent Computing 2, no. 2 (2025): 30–49. https://doi.org/10.63503/j.ijssic.2025.112.

Pełny tekst źródła
Streszczenie:
Current cryptographic systems and information security methods are largely based on the computational intractability and impracticability of reversing complex cryptographic algorithms and protocols. The foundation of secure communication and data protection strategies that we rely on a daily basis is provided by this computational difficulty. However, quantum computers with sufficient processing power could breach these basic security assumptions, making it possible to recover the cryptographic keys used to safeguard sensitive data and compromise widely used key exchange techniques. A viable s
Style APA, Harvard, Vancouver, ISO itp.
5

Kuo, Wen Hsiung, Pin Chiang Su, and Jiang Lung Liu. "A Secure Hybrid P2P Network Mobile Communication Device Design." Applied Mechanics and Materials 479-480 (December 2013): 968–72. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.968.

Pełny tekst źródła
Streszczenie:
Wireless Networkinfrastructure has Developed Rapidly with the Popularity of Personal Mobiledevices. Userscan Use Mobile Devices to Roam the Wireless Network Environment Conductingtransactions such as Sending Messages and Accessing the Internet. Networkcommunication has Become a Lifestyle Necessity. the Application of Information Technologyproducts also Brings IT Security Issues. the Wireless Network Environment Makesmessages Susceptible to Eavesdropping and Data Tampering Attacks. in Addition,the Mobile Device Computation Ability Presents Power Limiting Issues. Therefore,achieving Efficiency a
Style APA, Harvard, Vancouver, ISO itp.
6

Sasikala Devi, S., and Antony Selvadoss Danamani. "Efficient Hybrid Tree Key Distribution for Secure Multicast Communication." International Journal on Communications Antenna and Propagation (IRECAP) 4, no. 5 (2014): 202. http://dx.doi.org/10.15866/irecap.v4i5.3951.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

GÜRFİDAN, Remzi, and Mevlüt ERSOY. "A New Hybrid Encryption Approach for Secure Communication: GenComPass." International Journal of Computer Network and Information Security 12, no. 4 (2020): 1–10. http://dx.doi.org/10.5815/ijcnis.2020.04.01.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sridhar, S., and S. Smys. "Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment." Wireless Personal Communications 111, no. 1 (2019): 429–42. http://dx.doi.org/10.1007/s11277-019-06867-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nigischer, Christopher, and Jonas Vogt. "Automated Electric Mobility Secure Hybrid Communication with Data Protection." ATZelektronik worldwide 13, no. 4 (2018): 16–21. http://dx.doi.org/10.1007/s38314-018-0042-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Hybrid Secure Communication"

1

Prakash, Abhinav. "Anonymous and Secure Communication in a Wireless Mesh Network." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352397027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Pełny tekst źródła
Streszczenie:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des a
Style APA, Harvard, Vancouver, ISO itp.
3

Sahli, Nabil. "Contribution au problème de la sécurité sémantique des systèmes : approche basée sur l'ingénierie dirigée par les modèles." Electronic Thesis or Diss., Aix-Marseille, 2019. http://www.theses.fr/2019AIXM0699.

Pełny tekst źródła
Streszczenie:
Les infrastructures industrielles critiques seront dotées de plusieurs équipements embarqués intelligents. Elles exploitent des systèmes complexes, embarqués, intelligents et sémantiques pour leurs fonctionnements, en local et à distance, dans un contexte de développement, de villes intelligentes et du web des objets. Elles emploient, de plus en plus de systèmes «contrôle/commande», pour la surveillance des plateformes industrielles critiques, en temps réel. Les infrastructures critiques seront de plus en plus communicantes dans le cadre des échanges des alarmes et la mise en place de marchés
Style APA, Harvard, Vancouver, ISO itp.
4

Biswas, Jayanta. "Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks." Thesis, 2005. https://etd.iisc.ac.in/handle/2005/1402.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Biswas, Jayanta. "Toward Providing Secure Multicast Service For Mobile Entertainment Applications Over Wireless Networks." Thesis, 2005. http://etd.iisc.ernet.in/handle/2005/1402.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Hybrid Secure Communication"

1

Ali, Salman, and Faisal Anwer. "A hybrid cryptographic scheme for secure communication." In Advances in Science, Engineering and Technology. CRC Press, 2025. https://doi.org/10.1201/9781003641544-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Trikha, Pushali, and Lone Seth Jahanzaib. "Secure Communication: Using Double Compound-Combination Hybrid Synchronization." In Proceedings of International Conference on Artificial Intelligence and Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4992-2_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Moatemri, Maroua, Hamdi Eltaief, Ali El Kamel, and Habib Youssef. "Secure East-West Communication to Authenticate Mobile Devices in a Distributed and Hierarchical SDN." In Hybrid Intelligent Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_114.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ghosh, Papri, and Vishal Thakor. "Optimization of Hybrid Encryption Algorithm for Secure Communication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1165-9_89.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Prakash, Shiva, and Ashish Rajput. "Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7386-1_50.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kardi, Amine, and Rachid Zagrouba. "Hybrid Cryptography Algorithm for Secure Data Communication in WSNs: DECRSA." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6981-8_51.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Qureshi, Shahana Gajala, Sasmita Padhy, Preetam Suman, and Amrit Suman. "Hybrid Secure Clustered Nature-Inspired Decision Support System for Secure Data Communication in Cyberspace." In Cyberology. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003409571-18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kaur, Sharan Preet, and Surender Singh. "A Digital Steganography Technique Using Hybrid Encryption Methods for Secure Communication." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9331-2_41.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Islam, Nahida, Ishrat Sultana, and Md Sazzadur Rahman. "HKMS-AMI: A Hybrid Key Management Scheme for AMI Secure Communication." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4673-4_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Baranidharan, A., P. Velmurugadass, and A. Athiraja Atheeswaran. "Developing WBAN with secure data access and improved hybrid blockchain techniques." In Security Issues in Communication Devices, Networks and Computing Models. CRC Press, 2025. https://doi.org/10.1201/9781003513445-12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Hybrid Secure Communication"

1

Deng, Wensheng, Bin Qiu, and Wenchi Cheng. "Multi-Beam Symbol-Level Secure Communication for Hybrid Near- and Far-Field Communications." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695913.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Qi, Yihao, Zhou Su, Qichao Xu, Dongfeng Fang, Yuntao Wang, and Yiliang Liu. "Cooperative Secure Transmission for Hybrid Aerial IRS-assisted Communication System." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Williams, K. Lalith, Y. Durga Prasanth, and M. Jeyaselvi. "Hybrid AI Architecture using Edge-Cloud Computing for Secure V2X Communication." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859430.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

He, Chengyan, Hao Peng, Zhaolin Zhang, Chuang Han, and Ling Wang. "Robust Secure Hybrid Beamforming for RSMA Integrated Sensing and Communication Systems." In 2024 IEEE 7th International Conference on Electronics and Communication Engineering (ICECE). IEEE, 2024. https://doi.org/10.1109/icece63871.2024.10976885.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Aquina, Nick, Simon Rommel, and Idelfonso Tafur Monroy. "Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution." In 2024 24th International Conference on Transparent Optical Networks (ICTON). IEEE, 2024. http://dx.doi.org/10.1109/icton62926.2024.10648124.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jadhav, Swati, Smeet Darekar, Anurag Deshmukh, Bhavesh Deore, and Dev Datir. "Hybrid Steganographic and Encryption Approach using Color Analysis for Secure Image Communication." In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT). IEEE, 2024. https://doi.org/10.1109/icaiccit64383.2024.10912405.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

G, Kala Priydarshini, Hitesh Kalra, Lakshmi Sevukamoorthy, Chitrakant O. Banchhor, P. Gajendran, and Ayaan Faiz. "A Hybrid Signcryption Approach for Blockchain-Based Secure Communication in IoMT Networks." In 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2024. https://doi.org/10.1109/ictbig64922.2024.10911712.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chkirbene, Zina, Ala Gouissem, Ridha Hamila, Unal Devrim, and Arafat Al-Dweik. "Secure UAV-IRS Communication: A Hybrid Genetic Algorithms and Gradient Descent Approach." In 2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2024. https://doi.org/10.1109/pimrc59610.2024.10817367.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chauhan, Guman Singh, Kannan Srinivasan, Rahul Jadon, Rajababu Budda, Venkata Surya Teja Gollapalli, and Joseph Bamidele Awotunde. "GMAC-Enhanced Secure IoT Communication with CNN-LSTM Hybrid Model for Intrusion Detection." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10985390.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kazi, Atiya, Vinayak Bharadi, and Kaushal Prasad. "Attention-Driven CNN-LSTM Hybrid Models for Secure Dynamic Signature Verification." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Hybrid Secure Communication"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Pełny tekst źródła
Streszczenie:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!