Добірка наукової літератури з теми "Secure Channel Protocol (SCP)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Channel Protocol (SCP)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Channel Protocol (SCP)":
WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (December 2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.
Rubel, Paul, Jocelyne Fayn, Peter W. Macfarlane, Danilo Pani, Alois Schlögl, and Alpo Värri. "The History and Challenges of SCP-ECG: The Standard Communication Protocol for Computer-Assisted Electrocardiography." Hearts 2, no. 3 (August 24, 2021): 384–409. http://dx.doi.org/10.3390/hearts2030031.
WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (May 2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.
Shen, Dongsu, Wenping Ma, Meiling Wang, and Xunru Yin. "Improvement of a controlled quantum secure direct communication protocol." Modern Physics Letters B 28, no. 15 (June 17, 2014): 1450121. http://dx.doi.org/10.1142/s0217984914501218.
Sun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Harun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (September 9, 2020): 1481. http://dx.doi.org/10.3390/sym12091481.
Fu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.
Zhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.
Günther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
XIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (June 2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.
Дисертації з теми "Secure Channel Protocol (SCP)":
Larsson, Fredrik. ""Halfpipe Active Channel"- developing a secure communications protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2799.
With the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network.
The purpose of this thesis is to develop a secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the final protocol. The result, the Halfpipe Active Channel protocol, is an authorized, encrypted, session oriented, message based and light weight protocol designed to minimize computational as well as network overhead.
This master's thesis project was defined by and performed at Zenterio AB during the second half of 2004.
Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Частини книг з теми "Secure Channel Protocol (SCP)":
Niemi, Arto, Vasile Adrian Bogdan Pop, and Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol." In Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Zhou, Dan, and Shiu-Kai Chin. "Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol." In FM’99 — Formal Methods, 758–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48119-2_42.
Akram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, and Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets." In Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Rantos, Konstantinos, and Konstantinos Markantonakis. "An Asymmetric Cryptography Secure Channel Protocol for Smart Cards." In Security and Protection in Information Processing Systems, 351–65. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_23.
Javali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.
Abdullah, Hesham Mohammed Ali, and A. V. Senthil Kumar. "Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing." In Enabling Technologies and Architectures for Next-Generation Networking Capabilities, 105–24. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6023-4.ch005.
Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.
Thakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition, 1667–75. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.
Thakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, 71–81. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.
Chen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense, 130–45. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.
Тези доповідей конференцій з теми "Secure Channel Protocol (SCP)":
Alvermann, John, Michael Kurdziel, and William Furman. "The Secure Communication Interoperability Protocol (SCIP) over an HF Radio Channel." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302132.
Alvermann, John M., and Michael T. Kurdziel. "The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753183.
Effendi, Mufid Ridlo, Ridwan Sidik Al-Falah, Sarbini, and Nanang Ismail. "IoT-Based Battery Monitoring System in Solar Power Plants with Secure Copy Protocol (SCP)." In 2021 7th International Conference on Wireless and Telematics (ICWT). IEEE, 2021. http://dx.doi.org/10.1109/icwt52862.2021.9678210.
Ray, Baishakhi, and Shivakant Mishra. "A Protocol for Building Secure and Reliable Covert Channel." In 2008 Sixth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2008. http://dx.doi.org/10.1109/pst.2008.26.
Berchtold, Waldemar, Patrick Lieb, and Martin Steinebach. "Secure communication protocol for a low-bandwidth audio channel." In 2017 25th European Signal Processing Conference (EUSIPCO). IEEE, 2017. http://dx.doi.org/10.23919/eusipco.2017.8081601.
Obinna, Omego, Eckhard Pfluegel, Charles A. Clarke, and Martin J. Tunnicliffe. "A multi-channel steganographic protocol for secure SMS mobile banking." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356393.
Mahmood, Baban, Ahmed Ibrahim, and D. Manivannan. "SAriadne: A secure source routing protocol to prevent hidden-channel attacks." In 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2016. http://dx.doi.org/10.1109/wimob.2016.7763267.
Akram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, and Serge Chaumette. "An efficient, secure and trusted channel protocol for avionics wireless networks." In 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE, 2016. http://dx.doi.org/10.1109/dasc.2016.7777967.
Isaka, Motohiko. "An unconditionally secure protocol based on lattices over the Gaussian channel." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895618.
Poh, Geong Sen, Kok-Lim Alvin Yau, and Mee Hong Ling. "Analysis of a secure cooperative channel sensing protocol for cognitive radio networks." In the Fifth International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2388576.2388581.