Добірка наукової літератури з теми "Secure Networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Secure Networks"

1

Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Breeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Maivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.

Повний текст джерела
Анотація:
In-network aggregation is a natural approach in wireless sensor networks (WSNs) to collaboratively process data generated by the sensor nodes. Besides processing, in-network aggregation also achieves effective energy consumption and bandwidth utilization. Since the sensing devices of a WSN are prone to a variety of attacks due to wireless communication and limited resources, secure in-network aggregation is a great challenge. This article proposes a secure in-network aggregation (SINA) protocol for additive aggregation functions. This protocol integrates privacy homomorphism (PH) and secret sh
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Shang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.

Повний текст джерела
Анотація:
Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security man
Стилі APA, Harvard, Vancouver, ISO та ін.
8

von Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Al-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.

Повний текст джерела
Анотація:
The utilization of wireless sensor networks to gather, process, and act upon data may be a powerful tool in the development of a city-wide communication network that can accommodate many applications, ultimately leading to smart city solutions. Several challenges might be encountered by a smart city network. These include the need to adapt the network's coverage area to suit various applications, uneven distribution of nodes, a rise in message volume, the use of several communication technologies, and heterogeneity in both nodes and messages. There are many different facets of smart cities tha
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.

Повний текст джерела
Анотація:
Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effectiveness, responsibility, and dragging network continuance are all managed by RMECR. To develop dynamism-effective and reliable pathways that outstretch the network's functional continuance, it takes into account the bumps' dynamism operation, their remaining battery dynamism, and the tractability of their links. RMER, on the other phase, is a dynamism-effective routing algorith
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Secure Networks"

1

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Повний текст джерела
Анотація:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Повний текст джерела
Анотація:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Paul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.

Повний текст джерела
Анотація:
In recent years, cloud-based computing and storage have become increasingly popular,as they remove the need for users and developers to buy or rent expensive dedicated hardware on an ongoing basis. This has led to the increasing centralisation of both services and storage, where users are reliant upon a small number of cloud-based providers to hold their data, and provide them with services they use. Recent events have shown that security breaches of centralised data stores can lead to significant quantities of personal data being revealed. This centralisation can also result in inconvenience
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.

Повний текст джерела
Анотація:
This research focuses on developing a secure, SNMP-based network management system specifically tailored for deployment in internetworks that rely on low-bandwidth backbone networks. The network management system developed uses a two-level hierarchy of network management applications consisting of one top-level management application communicating with several mid-level management applications strategically distributed throughout the internetwork. Mid-level management applications conduct routine monitoring chores on behalf of the top-level management application and report results in a way
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Повний текст джерела
Анотація:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--University of California, San Diego, 2006.<br>Title from first page of PDF file (viewed September 8, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 99-103).
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Friji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.

Повний текст джерела
Анотація:
Face à l'escalade de la complexité et à la fréquence des cyberattaques, cette thèse propose des approches innovantes pour la détection d'intrusion dans les réseaux, en exploitant les capacités avancées des réseaux de neurones en graphe (Graph Neural Networks, GNNs) et de nouvelles représentations sous forme de graphes. Nous commençons par une analyse critique des jeux de données et des représentations de réseaux actuels, en abordant des questions clés sur leur efficacité. Nous introduisons une nouvelle représentation des flux de communication sous forme de graphes, offrant une plus grande robu
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Nawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.

Повний текст джерела
Анотація:
The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sen
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.

Повний текст джерела
Анотація:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 63-65).<br>Running image recognition algorithms on medical datasets raises several privacy concerns. Hospitals may not have access to an image recognition model that a third party may have developed, and medical images are HIPAA protected and thus, cannot leave hospital servers. However, with secure neural network inference, hospitals can send encrypted medical images as input to
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Secure Networks"

1

Preneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Conti, Mauro. Secure Wireless Sensor Networks. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-3460-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jayakody, Dushantha Nalin K., Kathiravan Srinivasan, and Vishal Sharma, eds. 5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03508-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Raymond, Greenlaw, ed. Secure roaming in 802.11 networks. Newnes, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bukowski, Lech. Reliable, Secure and Resilient Logistics Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00850-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Khan, Jahanzeb. Building Secure Wireless Networks with 802.11. John Wiley & Sons, Ltd., 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Anis, Khwaja, ed. Building secure wireless networks with 802.11. Wiley Pub., 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Purser, Michael. Secure data networking. Artech House, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Larry, Caffrey, Okot-Uma Rogers W'O, Commonwealth Secretariat, Commonwealth Network of Information Technology for Development., and International Council for Information Technology in Government Administration., eds. Government secure intranets. Commonwealth Secretariat, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Velliangiri, S., M. Gunasekaran, and P. Karthikeyan, eds. Secure Communication for 5G and IoT Networks. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-79766-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Secure Networks"

1

Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Secure Routing." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hicks, Michael, and Angelos D. Keromytis. "A Secure Plan." In Active Networks. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48507-0_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Herrigel, Alexander, and Xuejia Lai. "Secure IN internetworking." In Intelligent Networks. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34894-0_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Luo, Ming-Xing. "Secure Quantum Cloud Computing." In Quantum Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6226-2_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Physical Layer Secure Communications." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Karanastasis, Stelios, and Ahmed Patel. "Security on ATM Networks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Markantonakis, Constantinos, and Simeon Xenitellis. "Implementing a Secure Log File Download Manager for the Java Card." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Oppliger, Rolf. "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Adamson, W. A., C. J. Antonelli, K. W. Coffman, P. McDaniel, and J. Rees. "Secure Distributed Virtual Conferencing." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hardjono, Thomas, and Brad Cain. "PIM-SM Security: Interdomain Issues and Solutions." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Secure Networks"

1

Mas Machuca, Carmen. "Planning Strategy Towards Secure Optical Core Networks." In Photonic Networks and Devices. Optica Publishing Group, 2024. https://doi.org/10.1364/networks.2024.nem1c.4.

Повний текст джерела
Анотація:
Network operators are considering the increase of the data transmission security by the use of QKD devices. We present best planning strategies to reduce the required investments while maximizing the key capacity. Full-text article not available; see video presentation
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.

Повний текст джерела
Анотація:
The demand for cloud-based deep learning has intensified the need for secure computation. Our quantum-secure deep learning protocol leverages quantum properties of light and telecommunication components for scalable, secure cloud-based deep learning in optical networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rahman, Mohammad Saidur, Stephen DiAdamo, Miralem Mehic, and Charles Fleming. "Quantum Secure Anonymous Communication Networks." In 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2024. http://dx.doi.org/10.1109/qcnc62729.2024.00060.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bolgouras, Vaios, Aristeidis Farao, and Christos Xenakis. "Roadmap to Secure 6G Networks." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942738.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gharib, Dr Mohammed. "How to Secure Cooperative UAV Networks?" In 2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT). IEEE, 2024. http://dx.doi.org/10.1109/cpsat64082.2024.10745417.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sanghani, Parth, Sharada Valiveti, and Gaurang Raval. "Secure Data Flow Between Trusted Networks." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859796.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fan-Yuan, Guan-Jie. "High-secure quantum communication and networks." In 2024 IEEE Opto-Electronics and Communications Conference (OECC). IEEE, 2024. https://doi.org/10.1109/oecc54135.2024.10975607.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Fioravanti, Camilla, Ernesto Del Prete, and Roberto Setola. "Secure Gossip Algorithm for Industrial Networks." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073443.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

BA, Usha, and Aruna S. "Secure Decentralized File Sharing." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872313.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ellis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.

Повний текст джерела
Анотація:
Abstract State-of-the-art rail systems require reliant, redundant and critical and secure communications. Data integrity is paramount when considering the criticality that the data payload remains secure for 24/7 year-round applications. With technologies such as Communications Based Train Control (CBTC) and Positive Train Control (PTC) being implemented, considerations for data integrity in these networks must include methods to avoid internal and external vulnerabilities. Unlike traditional encryption methodologies, newer techniques involve tunneling payloads across open or closed networks;
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Secure Networks"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Повний текст джерела
Анотація:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Повний текст джерела
Анотація:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ravishankar, Chinya V., Srikanth Krishnamurthy, Michalis Faloutsos, and Satish Tripathi. Secure Wireless Fault Tolerant Tunable Networks (SWIFT). Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada437661.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Popkov, G. V. Algorithms for designing secure multiservice communication networks. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2023. http://dx.doi.org/10.12731/ofernio.2023.25165.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Clark, Paul C., Timothy E. Lavin, Cynthia E. Irvine, and David J. Shifflett. DNS and Multilevel Secure Networks: Architectures and Recommendations. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada498511.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Liu, Donggang. Secure and Robust Clustering in Wireless Sensor Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500585.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Datko, Joshua B. Supporting Secure, AD HOC Joins for Tactical Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403488.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Peterson, Larry, Randy Wang, and Vivek Pai. Building Secure and Reliable Networks Through Robust Resource Scheduling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada436189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Meseguer, Jose, and Carolyn Talcott. Maude: A Wide Spectrum Language for Secure Active Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada406892.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Повний текст джерела
Анотація:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!