Artykuły w czasopismach na temat „Hybrid Secure Communication”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hybrid Secure Communication”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Dhall, Sangeeta, Bharat Bhushan, and Shailender Gupta. "An Improved Hybrid Mechanism for Secure Data Communication." International Journal of Computer Network and Information Security 8, no. 6 (2016): 67–79. http://dx.doi.org/10.5815/ijcnis.2016.06.08.
Pełny tekst źródłaJain, Amrita, and Vivek Kapoor. "Policy for Secure Communication using Hybrid Encryption Algorithm." International Journal of Computer Applications 125, no. 10 (2015): 16–20. http://dx.doi.org/10.5120/ijca2015906035.
Pełny tekst źródłaLin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.
Pełny tekst źródłaSristi J, Andrew Vivan X, A Ashoka, Y B Tulasi, and Dr. Manjunath C R. "Software Based Implementation of a Hybrid Quantum Secure Cryptosystem for Secure Communication and Data Protection." International Journal on Smart & Sustainable Intelligent Computing 2, no. 2 (2025): 30–49. https://doi.org/10.63503/j.ijssic.2025.112.
Pełny tekst źródłaKuo, Wen Hsiung, Pin Chiang Su, and Jiang Lung Liu. "A Secure Hybrid P2P Network Mobile Communication Device Design." Applied Mechanics and Materials 479-480 (December 2013): 968–72. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.968.
Pełny tekst źródłaSasikala Devi, S., and Antony Selvadoss Danamani. "Efficient Hybrid Tree Key Distribution for Secure Multicast Communication." International Journal on Communications Antenna and Propagation (IRECAP) 4, no. 5 (2014): 202. http://dx.doi.org/10.15866/irecap.v4i5.3951.
Pełny tekst źródłaGÜRFİDAN, Remzi, and Mevlüt ERSOY. "A New Hybrid Encryption Approach for Secure Communication: GenComPass." International Journal of Computer Network and Information Security 12, no. 4 (2020): 1–10. http://dx.doi.org/10.5815/ijcnis.2020.04.01.
Pełny tekst źródłaRencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.
Pełny tekst źródłaSridhar, S., and S. Smys. "Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment." Wireless Personal Communications 111, no. 1 (2019): 429–42. http://dx.doi.org/10.1007/s11277-019-06867-0.
Pełny tekst źródłaNigischer, Christopher, and Jonas Vogt. "Automated Electric Mobility Secure Hybrid Communication with Data Protection." ATZelektronik worldwide 13, no. 4 (2018): 16–21. http://dx.doi.org/10.1007/s38314-018-0042-9.
Pełny tekst źródłaReddicherla, Vikram Raju, Umashankar Rawat, Y. Jeevan Nagendra Kumar, and Atef Zaguia. "Secure Vertical Handover to NEMO Using Hybrid Cryptosystem." Security and Communication Networks 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6751423.
Pełny tekst źródłaS, Dr Manishankar. "Secure IoT based Emergency Communication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3044–48. http://dx.doi.org/10.22214/ijraset.2022.44560.
Pełny tekst źródłaKabalci, Yasin, and Muhammad Ali. "Improved Hybrid Precoder Design for Secure mmWave MIMO Communications." Elektronika ir Elektrotechnika 26, no. 4 (2020): 72–77. http://dx.doi.org/10.5755/j01.eie.26.4.25857.
Pełny tekst źródłaGour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.
Pełny tekst źródłaRushika, Umesh Dhobale, and Tulshiram Gavali Shweta. "Blockchain for Secure Defense Communication Networks." Recent Trends in Control and Converter 8, no. 2 (2025): 6–21. https://doi.org/10.5281/zenodo.15348865.
Pełny tekst źródłaAmbareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.
Pełny tekst źródłaKapoor, Vivek, and Rati Gupta. "Hybrid symmetric cryptography approach for secure communication in web application." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 5 (2021): 1179–87. http://dx.doi.org/10.1080/09720529.2021.1936900.
Pełny tekst źródłaA. Moosa, Arwa, Malik A. Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp850-858.
Pełny tekst źródłaFouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.
Pełny tekst źródłaMoosa, Arwa A., Malik Abdulrazzaq Jabbar Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850–58. https://doi.org/10.11591/ijeecs.v28.i2.pp850-858.
Pełny tekst źródłaKiedrowski, Piotr. "Toward More Efficient and More Secure Last Mile Smart Metering and Smart Lighting Communication Systems with the Use of PLC/RF Hybrid Technology." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/675926.
Pełny tekst źródłaM, Dr Ganavi. "An Hybrid Encryption Approach to Secure Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40090.
Pełny tekst źródłaCHEN, WEI CHING, and JOHN YUAN. "SECURE COMMUNICATION BASED ON A HYBRID OF CHAOS AND ICA ENCRYPTIONS." International Journal of Modern Physics B 25, no. 02 (2011): 255–64. http://dx.doi.org/10.1142/s0217979211056950.
Pełny tekst źródłaKunchok, Tenzin, and Prof Kirubanand V. B. "A lightweight hybrid encryption technique to secure IoT data transmission." International Journal of Engineering & Technology 7, no. 2.6 (2018): 236. http://dx.doi.org/10.14419/ijet.v7i2.6.10776.
Pełny tekst źródłaLi, Rui, Guang Jun Zhang, Tao Zhu, Xu Jing Wang, and Jun Dong. "Generalized Hybrid Dislocated Function Projective Synchronization of Chaotic Systems with Time Delay." Applied Mechanics and Materials 574 (July 2014): 672–78. http://dx.doi.org/10.4028/www.scientific.net/amm.574.672.
Pełny tekst źródłaK.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.
Pełny tekst źródłaZehra, Afzal, and Kumar Manoj. "A Hybrid Method for Secure Communication and Performance Analysis in VANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1086–91. https://doi.org/10.35940/ijeat.E1022.069520.
Pełny tekst źródłaGoumidi, Mohammed Abdessamad Zigh Ehlem Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555–63. https://doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Pełny tekst źródłaK, Roslin Dayana. "ELLIPTICAL ADVANCED ENCRYPTION STANDARD - MODERN CRYPTOGRAPHY FOR SECURE DATA COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3351–57. https://doi.org/10.21917/ijct.2024.0497.
Pełny tekst źródłaFu, Yudi, Mengfan Cheng, Weidong Shao, et al. "Analog-digital hybrid chaos-based long-haul coherent optical secure communication." Optics Letters 46, no. 6 (2021): 1506. http://dx.doi.org/10.1364/ol.421770.
Pełny tekst źródłaSubedar, Zuhi, and Araballi Ashwini. "Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication." International Journal of Mathematical Sciences and Computing 6, no. 4 (2020): 35–41. http://dx.doi.org/10.5815/ijmsc.2020.04.04.
Pełny tekst źródłaVuppala, Satyanarayana, Sudip Biswas, and Tharmalingam Ratnarajah. "An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks." IEEE Transactions on Communications 64, no. 8 (2016): 3507–19. http://dx.doi.org/10.1109/tcomm.2016.2587287.
Pełny tekst źródłaUcar, Seyhan, Sinem Coleri Ergen, and Oznur Ozkasap. "IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon." IEEE Transactions on Vehicular Technology 67, no. 9 (2018): 8667–81. http://dx.doi.org/10.1109/tvt.2018.2840846.
Pełny tekst źródłaKim, Jin-Mook, and Jeong-Kyung Moon. "Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments." International Journal of Distributed Sensor Networks 10, no. 2 (2014): 828092. http://dx.doi.org/10.1155/2014/828092.
Pełny tekst źródłaRamalingam, Balakrishnan, Amirtharajan Rengarajan, and John Bosco Balaguru Rayappan. "Hybrid image crypto system for secure image communication– A VLSI approach." Microprocessors and Microsystems 50 (May 2017): 1–13. http://dx.doi.org/10.1016/j.micpro.2017.02.003.
Pełny tekst źródłaGopikrishnan, S., and P. Priakanth. "HSDA: hybrid communication for secure data aggregation in wireless sensor network." Wireless Networks 22, no. 3 (2015): 1061–78. http://dx.doi.org/10.1007/s11276-015-1122-x.
Pełny tekst źródłaYin, Aihan, and Hongchao Liang. "Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks." Wireless Personal Communications 80, no. 3 (2014): 1049–62. http://dx.doi.org/10.1007/s11277-014-2070-y.
Pełny tekst źródłaIssad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.
Pełny tekst źródłaEl-Shafai, W., S. El-Rabaie, M. M. El-Halawany, and Fathi E. Abd El-Samie. "Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication." International Journal of Communication Systems 31, no. 4 (2017): e3478. http://dx.doi.org/10.1002/dac.3478.
Pełny tekst źródłaAlatawi, Mohammed Naif. "A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities." International Journal of Computer Networks and Applications 10, no. 5 (2023): 776. http://dx.doi.org/10.22247/ijcna/2023/223423.
Pełny tekst źródłaK., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.
Pełny tekst źródłaAnnamalai, Meenatchi Sundaram Muthu Selva, Chao Jin, and Khin Mi Mi Aung. "Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption." Applied Sciences 12, no. 22 (2022): 11462. http://dx.doi.org/10.3390/app122211462.
Pełny tekst źródłaAli, J. Abboud, N. Albu-Rghaif Ali, and Kirebut Jassim Abbood. "Balancing Compression and Encryption of Satellite Imagery." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3568–86. https://doi.org/10.11591/ijece.v8i5.pp3568-3586.
Pełny tekst źródłaOjetunde, Babatunde, Takuya Kurihara, Kazuto Yano, Toshikazu Sakano, and Hiroyuki Yokoyama. "A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication." Network 5, no. 2 (2025): 20. https://doi.org/10.3390/network5020020.
Pełny tekst źródłaZhang, Shiqi, and Chao Zheng. "Quantum Secure Direct Communication Technology-Enhanced Time-Sensitive Networks." Entropy 27, no. 3 (2025): 221. https://doi.org/10.3390/e27030221.
Pełny tekst źródłaZhang, Gang, Niting Cui, and Tianqi Zhang. "Novel Chaos Secure Communication System Based on Walsh Code." Journal of Electrical and Computer Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/649096.
Pełny tekst źródłaKEERTHANA, V., J. Mangaiyarkarasi, and A. N. Arun. "A Hybrid Cloud Approach for Secure Authorized Deduplication System Using Facial Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–11. http://dx.doi.org/10.55041/ijsrem37048.
Pełny tekst źródłaZakaret, Carine, Nikolaos Peladarinos, Vasileios Cheimaras, et al. "Blockchain and Secure Element, a Hybrid Approach for Secure Energy Smart Meter Gateways." Sensors 22, no. 24 (2022): 9664. http://dx.doi.org/10.3390/s22249664.
Pełny tekst źródłaMr.Dilish, Babu.J*, and Mohan Kumar Dr.S. "A SURVEY ON SECURE COMMUNICATION IN PUBLIC NETWORK DURING DISASTER." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 430–34. https://doi.org/10.5281/zenodo.47577.
Pełny tekst źródłaAbdessamad, Goumidi Mohammed, Zigh Ehlem, and Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Pełny tekst źródła