Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Hybrid Secure Communication.

Artykuły w czasopismach na temat „Hybrid Secure Communication”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hybrid Secure Communication”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Dhall, Sangeeta, Bharat Bhushan, and Shailender Gupta. "An Improved Hybrid Mechanism for Secure Data Communication." International Journal of Computer Network and Information Security 8, no. 6 (2016): 67–79. http://dx.doi.org/10.5815/ijcnis.2016.06.08.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jain, Amrita, and Vivek Kapoor. "Policy for Secure Communication using Hybrid Encryption Algorithm." International Journal of Computer Applications 125, no. 10 (2015): 16–20. http://dx.doi.org/10.5120/ijca2015906035.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lin, Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou, and Yanbo Zhou. "Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications." Drones 9, no. 6 (2025): 422. https://doi.org/10.3390/drones9060422.

Pełny tekst źródła
Streszczenie:
In order to solve the problems of identity solidification, key duration, and lack of anonymity in communications between unmanned aerial vehicles (UAVs) and ground control stations (GCSs), a mutual secure communication scheme named Dynamic Identity and Hybrid Encryption is proposed in this paper. By constructing an identity update mechanism and a lightweight hybrid encryption system, the anonymity and untraceability of the communicating parties can be realized within a resource-limited environment, and threats such as man-in-the-middle (MITM) attacks, identity forgery, and message tampering ca
Style APA, Harvard, Vancouver, ISO itp.
4

Sristi J, Andrew Vivan X, A Ashoka, Y B Tulasi, and Dr. Manjunath C R. "Software Based Implementation of a Hybrid Quantum Secure Cryptosystem for Secure Communication and Data Protection." International Journal on Smart & Sustainable Intelligent Computing 2, no. 2 (2025): 30–49. https://doi.org/10.63503/j.ijssic.2025.112.

Pełny tekst źródła
Streszczenie:
Current cryptographic systems and information security methods are largely based on the computational intractability and impracticability of reversing complex cryptographic algorithms and protocols. The foundation of secure communication and data protection strategies that we rely on a daily basis is provided by this computational difficulty. However, quantum computers with sufficient processing power could breach these basic security assumptions, making it possible to recover the cryptographic keys used to safeguard sensitive data and compromise widely used key exchange techniques. A viable s
Style APA, Harvard, Vancouver, ISO itp.
5

Kuo, Wen Hsiung, Pin Chiang Su, and Jiang Lung Liu. "A Secure Hybrid P2P Network Mobile Communication Device Design." Applied Mechanics and Materials 479-480 (December 2013): 968–72. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.968.

Pełny tekst źródła
Streszczenie:
Wireless Networkinfrastructure has Developed Rapidly with the Popularity of Personal Mobiledevices. Userscan Use Mobile Devices to Roam the Wireless Network Environment Conductingtransactions such as Sending Messages and Accessing the Internet. Networkcommunication has Become a Lifestyle Necessity. the Application of Information Technologyproducts also Brings IT Security Issues. the Wireless Network Environment Makesmessages Susceptible to Eavesdropping and Data Tampering Attacks. in Addition,the Mobile Device Computation Ability Presents Power Limiting Issues. Therefore,achieving Efficiency a
Style APA, Harvard, Vancouver, ISO itp.
6

Sasikala Devi, S., and Antony Selvadoss Danamani. "Efficient Hybrid Tree Key Distribution for Secure Multicast Communication." International Journal on Communications Antenna and Propagation (IRECAP) 4, no. 5 (2014): 202. http://dx.doi.org/10.15866/irecap.v4i5.3951.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

GÜRFİDAN, Remzi, and Mevlüt ERSOY. "A New Hybrid Encryption Approach for Secure Communication: GenComPass." International Journal of Computer Network and Information Security 12, no. 4 (2020): 1–10. http://dx.doi.org/10.5815/ijcnis.2020.04.01.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rencis, Edgars, Juris Vīksna, Sergejs Kozlovičs, Edgars Celms, Dāvis Jānis Lāriņš, and Krišjānis Petručeņa. "Hybrid QKD-based framework for secure enterprise communication system." Procedia Computer Science 239 (2024): 420–28. http://dx.doi.org/10.1016/j.procs.2024.06.189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sridhar, S., and S. Smys. "Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment." Wireless Personal Communications 111, no. 1 (2019): 429–42. http://dx.doi.org/10.1007/s11277-019-06867-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Nigischer, Christopher, and Jonas Vogt. "Automated Electric Mobility Secure Hybrid Communication with Data Protection." ATZelektronik worldwide 13, no. 4 (2018): 16–21. http://dx.doi.org/10.1007/s38314-018-0042-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Reddicherla, Vikram Raju, Umashankar Rawat, Y. Jeevan Nagendra Kumar, and Atef Zaguia. "Secure Vertical Handover to NEMO Using Hybrid Cryptosystem." Security and Communication Networks 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/6751423.

Pełny tekst źródła
Streszczenie:
To provide security to all pairs of nodes in network mobility (NEMO) while executing the handoff between different technologies, a hybrid cryptosystem with a suitable network selection mechanism is proposed. All pairs of nodes, i.e., Mobile Node (MN), Mobile Router (MR), Correspondent Node (CN) and MN, and Home Agent (HA), respectively, are considered. A proper security mechanism is proposed to provide confidentiality to Bound Update (BU) during handoff and conversation between MN, MR, and HA using the elliptic curve cryptography (ECC). In this solution, a network selection mechanism is propos
Style APA, Harvard, Vancouver, ISO itp.
12

S, Dr Manishankar. "Secure IoT based Emergency Communication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3044–48. http://dx.doi.org/10.22214/ijraset.2022.44560.

Pełny tekst źródła
Streszczenie:
Abstract: The Internet of Things is the most recent & rapidly developing technology of our time. This paper proposed the idea of Hybrid-cellular Wireless sensor network architecture which uses a functioning cellular base station. A routing scheme is also proposed for the emergency scenario that systematically utilizes accessible devices. Wireless devices are taken into account in the proposed emergency communication architecture, which also supports WSN's self-organizing function. Within a few hours, this communication model may be put up in disaster-stricken communities. The proposed meth
Style APA, Harvard, Vancouver, ISO itp.
13

Kabalci, Yasin, and Muhammad Ali. "Improved Hybrid Precoder Design for Secure mmWave MIMO Communications." Elektronika ir Elektrotechnika 26, no. 4 (2020): 72–77. http://dx.doi.org/10.5755/j01.eie.26.4.25857.

Pełny tekst źródła
Streszczenie:
Key challenges of emerging mobile communication systems are to provide higher data rates, diverse device connectivity, low latency, higher system capacity, and low energy consumption. The communication systems exploiting the millimeter-wave (mmWave) band are realized to resolve thereof inevitable issues. However, security is considered as one of the challenging issues in mmWave communication in addition to unavoidable problems (e.g., propagation loss, penetration loss, and fading). This study aims to construct efficient secure hybrid precoder with low-resolution phase shifters that can protect
Style APA, Harvard, Vancouver, ISO itp.
14

Gour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.

Pełny tekst źródła
Streszczenie:
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals alike, safeguarding sensitive information and ensuring secure communication channels has become paramount. This research paper introduces a novel hybrid cryptographic algorithm designed to address the multifaceted challenges of data security and secure communication. The proposed algorithm leverages the beneficial features of symmetric and asymmetric encryption approaches, developing a way for robust and adaptable security solutions. This hybrid algorithm begins by utilizing a state-of-the-art symmet
Style APA, Harvard, Vancouver, ISO itp.
15

Rushika, Umesh Dhobale, and Tulshiram Gavali Shweta. "Blockchain for Secure Defense Communication Networks." Recent Trends in Control and Converter 8, no. 2 (2025): 6–21. https://doi.org/10.5281/zenodo.15348865.

Pełny tekst źródła
Streszczenie:
<em>In modern defense communication networks, ensuring security, integrity, and resilience against cyber threats is of paramount importance. Traditional centralized network architectures are prone to cyberattacks, data breaches, and unauthorized access, posing significant risks to national security. Blockchain technology, with its decentralized, immutable, and cryptographically secure nature, presents a revolutionary solution for safeguarding military communication infrastructures. By leveraging distributed ledger mechanisms, blockchain enhances data integrity, prevents unauthorized modificati
Style APA, Harvard, Vancouver, ISO itp.
16

Ambareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.

Pełny tekst źródła
Streszczenie:
Device-to-device (D2D) communications in 5G networks will provide greater coverage, as devices will be acting as users or relays without any intermediate nodes. However, this arrangement poses specific security issues, such as rogue relays, and is susceptible to various types of attacks (impersonation, eavesdropping, denial-of-service), due to the fact that communication occurs directly. It is also recommended to send fewer control messages, due to authenticity- and secrecy related prevailing requirements in such scenarios. Issues related to IoT applications need to be taken into consideration
Style APA, Harvard, Vancouver, ISO itp.
17

Kapoor, Vivek, and Rati Gupta. "Hybrid symmetric cryptography approach for secure communication in web application." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 5 (2021): 1179–87. http://dx.doi.org/10.1080/09720529.2021.1936900.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

A. Moosa, Arwa, Malik A. Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp850-858.

Pełny tekst źródła
Streszczenie:
This work investigates the integration of Electrical to Optical (E/O) and Optical to Electrical (E/O) communication systems. Two ways of transition, namely, Hybrid Fiber Optic (FO) and Free Optical Space (FSO) transmission system have been proposed. This work aims to evaluate the performance of these two transition ways. FO has the optimum transmission due to its lower attenuation which can be reached to 350 km. However, for further assurance of reaching data to the receiver side a second way of transition has been investigated. FSO path has been employed under different weather conditions of
Style APA, Harvard, Vancouver, ISO itp.
19

Fouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.

Pełny tekst źródła
Streszczenie:
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content providers has resulted in security breaches within entertainment applications, hence causing a reduction in the client base. This research aimed to enhance the security measures employed for video content by implementing a multi-key approach for encryption and decryption processes. The aforementioned objective was successfully accomplished through
Style APA, Harvard, Vancouver, ISO itp.
20

Moosa, Arwa A., Malik Abdulrazzaq Jabbar Alsaedi, Hussein Jumma Jabir, and Mays Afif Anaee. "Secure hybrid fiber optic and free optical space communication systems." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 850–58. https://doi.org/10.11591/ijeecs.v28.i2.pp850-858.

Pełny tekst źródła
Streszczenie:
This work investigates the integration of electrical to optical (E/O) and optical to electrical (E/O) communication systems. Two ways of transition, namely, hybrid fiber optic (FO) and free space optical (FSO) transmission system have been proposed. This work aims to evaluate the performance of these two transition ways. FO has the optimum transmission due to its lower attenuation which can be reached to 350 km. However, for further assurance of reaching data to the receiver side a second way of transition has been investigated. FSO path has been employed under different weather conditions of
Style APA, Harvard, Vancouver, ISO itp.
21

Kiedrowski, Piotr. "Toward More Efficient and More Secure Last Mile Smart Metering and Smart Lighting Communication Systems with the Use of PLC/RF Hybrid Technology." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/675926.

Pełny tekst źródła
Streszczenie:
This paper describes the last mile communication system solutions realized in PLC/RF hybrid technology, which is dedicated to Smart Grid communication subsystems, mainly for Smart Metering and Smart Lighting applications. The use of hybrid technology makes the system more efficient and more secure (still being of low cost, in terms of both implementation and operation). This paper proposes a novel parameter, PDR, to describe the performance of the communications in the last mile network. The communications are realized with the use of the narrowband power line communications technique, the low
Style APA, Harvard, Vancouver, ISO itp.
22

M, Dr Ganavi. "An Hybrid Encryption Approach to Secure Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40090.

Pełny tekst źródła
Streszczenie:
the paper explores the role of encryption in ensuring secure data transfer over various communication channels. It discusses different encryption methods, their implementation, and their effectiveness in protecting data from unauthorized access. By Analyzing contemporary techniques and potential vulnerabilities, the paper aims to present a comprehensive overview of encryption as a cornerstone of modern data security. Here’s a general outline for a paper on "An Encryption Approach to Achieve Secure Data Transfer." This paper can provide an overview of the methods, benefits, and challenges of en
Style APA, Harvard, Vancouver, ISO itp.
23

CHEN, WEI CHING, and JOHN YUAN. "SECURE COMMUNICATION BASED ON A HYBRID OF CHAOS AND ICA ENCRYPTIONS." International Journal of Modern Physics B 25, no. 02 (2011): 255–64. http://dx.doi.org/10.1142/s0217979211056950.

Pełny tekst źródła
Streszczenie:
Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embe
Style APA, Harvard, Vancouver, ISO itp.
24

Kunchok, Tenzin, and Prof Kirubanand V. B. "A lightweight hybrid encryption technique to secure IoT data transmission." International Journal of Engineering & Technology 7, no. 2.6 (2018): 236. http://dx.doi.org/10.14419/ijet.v7i2.6.10776.

Pełny tekst źródła
Streszczenie:
Internet of Things(IOT) is the rising innovation without bounds is required to associate billions of devices. IoT is the future where many low power resources and constrained devices are connected by means of the internet for communication, compute process and take actions in the communication network. The increased number of communication is relied upon to produce heaps of information and the security of information can be a threat resulting a secure solution for communication is necessitates among heterogenous devices. Focus of the work is to provide confidentiality, authentication and integ
Style APA, Harvard, Vancouver, ISO itp.
25

Li, Rui, Guang Jun Zhang, Tao Zhu, Xu Jing Wang, and Jun Dong. "Generalized Hybrid Dislocated Function Projective Synchronization of Chaotic Systems with Time Delay." Applied Mechanics and Materials 574 (July 2014): 672–78. http://dx.doi.org/10.4028/www.scientific.net/amm.574.672.

Pełny tekst źródła
Streszczenie:
In order to improve the security of secure communication, a novel generalized hybrid dislocated function projective synchronization (GHDFPS) was proposed and GHDFPS of time delay chaotic systems with uncertain parameters were researched in this paper. Due to time delay, the chaotic system can produce multiple positive Lyapunov exponential; this characteristic can enhance security in secure communications noticeably. Based on Lyapunove stability theory and modified hybrid feedback control method, the modified hybrid feedback controller and the parameter updating laws were designed for the GHDFP
Style APA, Harvard, Vancouver, ISO itp.
26

K.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.

Pełny tekst źródła
Streszczenie:
<em>Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different wireless communication technologies, MANETs are important because they have mobile nodes that can be randomly coupled via wireless links. </em><em>Every node in the network functions as a router and keeps trac
Style APA, Harvard, Vancouver, ISO itp.
27

Zehra, Afzal, and Kumar Manoj. "A Hybrid Method for Secure Communication and Performance Analysis in VANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1086–91. https://doi.org/10.35940/ijeat.E1022.069520.

Pełny tekst źródła
Streszczenie:
Vehicular Ad-hoc network a subclass of Mobile Ad-hoc network with various features providing Vehicle-to-Vehicle communication, Vehicle-to-RSU communication, Vehicle-to-Trusted Authority Communication. VANET is gaining higher attention now days both in industry and academic area and has become a trending research topic for research but still a lot of improvements is required in this area. Security of data is one of the major challenge in VANET. Encryption of data with the help of various encryption algorithms came up as solution for securing communication in VANET. But existing encryption algor
Style APA, Harvard, Vancouver, ISO itp.
28

Goumidi, Mohammed Abdessamad Zigh Ehlem Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555–63. https://doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.

Pełny tekst źródła
Streszczenie:
In this paper, we aimed to develop a trusted secured routing Ad-hoc on-demand distance vector (AODV) protocol to fight against blackhole attacks within the wireless body area network (WBAN). The trusted secure routing protocol incorporates a routing strategy based on trust value to detect malicious nodes based on their trust value, a routing technique based on node residual energy to select the node with the highest residual energy during the communication process, and a hybrid cryptography algorithm that merges the Affine cipher with the modified RSA cipher algorithm to secure communication a
Style APA, Harvard, Vancouver, ISO itp.
29

K, Roslin Dayana. "ELLIPTICAL ADVANCED ENCRYPTION STANDARD - MODERN CRYPTOGRAPHY FOR SECURE DATA COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3351–57. https://doi.org/10.21917/ijct.2024.0497.

Pełny tekst źródła
Streszczenie:
In an era where data security remains paramount, modern cryptographic systems are essential to safeguarding sensitive information. The Elliptical Advanced Encryption Standard (E-AES) is a cutting-edge approach that leverages the strengths of traditional AES and elliptic curve cryptography (ECC). While AES is celebrated for its robust encryption capabilities, it suffers from increased computational overhead in resource-constrained environments. Similarly, ECC offers lightweight encryption with high security but faces challenges with scalability and data throughput. Combining these methodologies
Style APA, Harvard, Vancouver, ISO itp.
30

Fu, Yudi, Mengfan Cheng, Weidong Shao, et al. "Analog-digital hybrid chaos-based long-haul coherent optical secure communication." Optics Letters 46, no. 6 (2021): 1506. http://dx.doi.org/10.1364/ol.421770.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Subedar, Zuhi, and Araballi Ashwini. "Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication." International Journal of Mathematical Sciences and Computing 6, no. 4 (2020): 35–41. http://dx.doi.org/10.5815/ijmsc.2020.04.04.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Vuppala, Satyanarayana, Sudip Biswas, and Tharmalingam Ratnarajah. "An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks." IEEE Transactions on Communications 64, no. 8 (2016): 3507–19. http://dx.doi.org/10.1109/tcomm.2016.2587287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Ucar, Seyhan, Sinem Coleri Ergen, and Oznur Ozkasap. "IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon." IEEE Transactions on Vehicular Technology 67, no. 9 (2018): 8667–81. http://dx.doi.org/10.1109/tvt.2018.2840846.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Kim, Jin-Mook, and Jeong-Kyung Moon. "Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments." International Journal of Distributed Sensor Networks 10, no. 2 (2014): 828092. http://dx.doi.org/10.1155/2014/828092.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Ramalingam, Balakrishnan, Amirtharajan Rengarajan, and John Bosco Balaguru Rayappan. "Hybrid image crypto system for secure image communication– A VLSI approach." Microprocessors and Microsystems 50 (May 2017): 1–13. http://dx.doi.org/10.1016/j.micpro.2017.02.003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Gopikrishnan, S., and P. Priakanth. "HSDA: hybrid communication for secure data aggregation in wireless sensor network." Wireless Networks 22, no. 3 (2015): 1061–78. http://dx.doi.org/10.1007/s11276-015-1122-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Yin, Aihan, and Hongchao Liang. "Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks." Wireless Personal Communications 80, no. 3 (2014): 1049–62. http://dx.doi.org/10.1007/s11277-014-2070-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Issad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.

Pełny tekst źródła
Streszczenie:
With the development of information technologies, our environment is surrounded by digital data that transit via networks. When data are important, they become vulnerable to external attacks which can be avoided by using cryptography which provides confidentiality, integrity and availability required to secure digital data transactions such as e- commerce, mobile telephony and Internet. This paper deals with securing data transmitted over a network composed by a server and several clients, where a security platform has been integrated into the server and embedded on an FPGA circuit. The protec
Style APA, Harvard, Vancouver, ISO itp.
39

El-Shafai, W., S. El-Rabaie, M. M. El-Halawany, and Fathi E. Abd El-Samie. "Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication." International Journal of Communication Systems 31, no. 4 (2017): e3478. http://dx.doi.org/10.1002/dac.3478.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Alatawi, Mohammed Naif. "A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities." International Journal of Computer Networks and Applications 10, no. 5 (2023): 776. http://dx.doi.org/10.22247/ijcna/2023/223423.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

K., Thamizhmaran. "Secure Communication in Black Hole Attack for MANET using Hybrid Protocol." Journal of Emerging Trends in Electrical Engineering 7, no. 1 (2024): 1–7. https://doi.org/10.5281/zenodo.14500296.

Pełny tekst źródła
Streszczenie:
<em>Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any
Style APA, Harvard, Vancouver, ISO itp.
42

Annamalai, Meenatchi Sundaram Muthu Selva, Chao Jin, and Khin Mi Mi Aung. "Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption." Applied Sciences 12, no. 22 (2022): 11462. http://dx.doi.org/10.3390/app122211462.

Pełny tekst źródła
Streszczenie:
The power and robustness of statistical tests are strongly tied to the amount of data available for testing. However, much of the collected data today is siloed amongst various data owners due to privacy concerns, thus limiting the utility of the collected data. While frameworks for secure multiparty computation enable functions to be securely evaluated on federated datasets, they depend on protocols over secret shared data, which result in high communication costs even in the semi-honest setting.In this paper, we present methods for securely evaluating statistical tests, specifically the Welc
Style APA, Harvard, Vancouver, ISO itp.
43

Ali, J. Abboud, N. Albu-Rghaif Ali, and Kirebut Jassim Abbood. "Balancing Compression and Encryption of Satellite Imagery." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3568–86. https://doi.org/10.11591/ijece.v8i5.pp3568-3586.

Pełny tekst źródła
Streszczenie:
With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithm
Style APA, Harvard, Vancouver, ISO itp.
44

Ojetunde, Babatunde, Takuya Kurihara, Kazuto Yano, Toshikazu Sakano, and Hiroyuki Yokoyama. "A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication." Network 5, no. 2 (2025): 20. https://doi.org/10.3390/network5020020.

Pełny tekst źródła
Streszczenie:
Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum Cryptography (PQC) algorithms will have on various applications without the actual implementation of quantum-resistant cryptography. On the other hand, PQC algorithms come with complexity and long processing times, which may impact the quality of service (QoS) of many applications. Therefore, PQC-based protocols with practical implementations acros
Style APA, Harvard, Vancouver, ISO itp.
45

Zhang, Shiqi, and Chao Zheng. "Quantum Secure Direct Communication Technology-Enhanced Time-Sensitive Networks." Entropy 27, no. 3 (2025): 221. https://doi.org/10.3390/e27030221.

Pełny tekst źródła
Streszczenie:
Quantum information has emerged as a frontier in scientific research and is transitioning to real-world technologies and applications. In this work, we explore the integration of quantum secure direct communication (QSDC) with time-sensitive networking (TSN) for the first time, proposing a novel framework to address the security and latency challenges of Ethernet-based networks. Because our QSDC-TSN protocol inherits all the advantages from QSDC, it will enhance the security of the classical communications both in the traditional TSN- and QKD-based TSN by the quantum principle and reduce the c
Style APA, Harvard, Vancouver, ISO itp.
46

Zhang, Gang, Niting Cui, and Tianqi Zhang. "Novel Chaos Secure Communication System Based on Walsh Code." Journal of Electrical and Computer Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/649096.

Pełny tekst źródła
Streszczenie:
A multiuser communication scheme which is a hybrid of Walsh code with DCSK and CDSK is proposed to improve low data transmission rate of Differential Chaos Shift Keying (DCSK), poor bit error ratio (BER) performance of Correlation Delay Shift Keying (CDSK), and disadvantage of orthogonality in traditional multiuser DCSK. It not only overcomes the disadvantages of DCSK and CDSK, but also has better performance than CDSK and higher transmission data rate than DCSK. It has been proved that the novel multiuser CDSK-DCSK has better properties than traditional Multiple Input Multiple Output-Differen
Style APA, Harvard, Vancouver, ISO itp.
47

KEERTHANA, V., J. Mangaiyarkarasi, and A. N. Arun. "A Hybrid Cloud Approach for Secure Authorized Deduplication System Using Facial Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–11. http://dx.doi.org/10.55041/ijsrem37048.

Pełny tekst źródła
Streszczenie:
Over the use of peer-to-peer encryption, businesses are able to establish private communication channels between devices or parts of devices, ensuring that no intermediary devices are able to decipher important data as it travels over the network. To safeguard sensitive information like credit card details, PIN numbers, and passwords, privacy is essential. Rather of being handed down orally, this kind of knowledge may be exchanged digitally using messaging programs such as WhatsApp or Facebook Messenger.Most of these apps use what is known as peer-to-peer encryption, a kind of two-way communic
Style APA, Harvard, Vancouver, ISO itp.
48

Zakaret, Carine, Nikolaos Peladarinos, Vasileios Cheimaras, et al. "Blockchain and Secure Element, a Hybrid Approach for Secure Energy Smart Meter Gateways." Sensors 22, no. 24 (2022): 9664. http://dx.doi.org/10.3390/s22249664.

Pełny tekst źródła
Streszczenie:
This paper presents a new hybrid approach that is suitable for application to energy smart meter gateways, based on combining both blockchain and Secure Element (SE) technologies serving the roles of a secure distributed data storage system and an essential component for building a “root of trust” in IoT platforms simultaneously. Blockchain technology alone may not completely secure a transaction because it only guarantees data immutability, while in most cases, the data has to be also secured at the point of generation. The proposed combinational approach aims to build a robust root of trust
Style APA, Harvard, Vancouver, ISO itp.
49

Mr.Dilish, Babu.J*, and Mohan Kumar Dr.S. "A SURVEY ON SECURE COMMUNICATION IN PUBLIC NETWORK DURING DISASTER." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 430–34. https://doi.org/10.5281/zenodo.47577.

Pełny tekst źródła
Streszczenie:
Secure communication is possible, when two entities are communicating and do not want/allowed a third party to listen in/enter in. A Disaster is a serious disruption of the functioning of a community or a society involving widespread human, material, economic or environmental losses and impacts which exceeds the ability of the affected community or society to cope using its own resources.In disaster situations, such as search and rescue for victims of hurricanes, earthquakes, or tsunamis, network access to the outside world is critical for information dissemination, resource allocation, and re
Style APA, Harvard, Vancouver, ISO itp.
50

Abdessamad, Goumidi Mohammed, Zigh Ehlem, and Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.

Pełny tekst źródła
Streszczenie:
&lt;p&gt;In this paper, we aimed to develop a trusted secured routing Ad-hoc on-demand distance vector (AODV) protocol to fight against blackhole attacks within the wireless body area network (WBAN). The trusted secure routing protocol incorporates a routing strategy based on trust value to detect malicious nodes based on their trust value, a routing technique based on node residual energy to select the node with the highest residual energy during the communication process, and a hybrid cryptography algorithm that merges the Affine cipher with the modified RSA cipher algorithm to secure commun
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!