Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Secure Networks.

Дисертації з теми "Secure Networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Secure Networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Повний текст джерела
Анотація:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Повний текст джерела
Анотація:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Paul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.

Повний текст джерела
Анотація:
In recent years, cloud-based computing and storage have become increasingly popular,as they remove the need for users and developers to buy or rent expensive dedicated hardware on an ongoing basis. This has led to the increasing centralisation of both services and storage, where users are reliant upon a small number of cloud-based providers to hold their data, and provide them with services they use. Recent events have shown that security breaches of centralised data stores can lead to significant quantities of personal data being revealed. This centralisation can also result in inconvenience
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.

Повний текст джерела
Анотація:
This research focuses on developing a secure, SNMP-based network management system specifically tailored for deployment in internetworks that rely on low-bandwidth backbone networks. The network management system developed uses a two-level hierarchy of network management applications consisting of one top-level management application communicating with several mid-level management applications strategically distributed throughout the internetwork. Mid-level management applications conduct routine monitoring chores on behalf of the top-level management application and report results in a way
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Повний текст джерела
Анотація:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--University of California, San Diego, 2006.<br>Title from first page of PDF file (viewed September 8, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 99-103).
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Friji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.

Повний текст джерела
Анотація:
Face à l'escalade de la complexité et à la fréquence des cyberattaques, cette thèse propose des approches innovantes pour la détection d'intrusion dans les réseaux, en exploitant les capacités avancées des réseaux de neurones en graphe (Graph Neural Networks, GNNs) et de nouvelles représentations sous forme de graphes. Nous commençons par une analyse critique des jeux de données et des représentations de réseaux actuels, en abordant des questions clés sur leur efficacité. Nous introduisons une nouvelle représentation des flux de communication sous forme de graphes, offrant une plus grande robu
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Nawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.

Повний текст джерела
Анотація:
The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sen
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.

Повний текст джерела
Анотація:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 63-65).<br>Running image recognition algorithms on medical datasets raises several privacy concerns. Hospitals may not have access to an image recognition model that a third party may have developed, and medical images are HIPAA protected and thus, cannot leave hospital servers. However, with secure neural network inference, hospitals can send encrypted medical images as input to
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Tin, Yiu Shing (Terry). "Secure key establishment for mobile networks." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.

Повний текст джерела
Анотація:
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the valid argument for their security in the past. Although it can provide some confidence in protocol correctness, experience has shown time and again that ake protocols are likely to contain flaws even after an informal analysis is completed. Therefore, it has become increasingly common to expect a formal analysis, and preferably a mathematical proof, of any published ake protocol in order to obtain increased confidence in its security. In this research we use an appropriate model for analy
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Tin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.

Повний текст джерела
Анотація:
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the valid argument for their security in the past. Although it can provide some confidence in protocol correctness, experience has shown time and again that ake protocols are likely to contain flaws even after an informal analysis is completed. Therefore, it has become increasingly common to expect a formal analysis, and preferably a mathematical proof, of any published ake protocol in order to obtain increased confidence in its security. In this research we use an appropriate model for analy
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Rigby, Simon. "Key management in secure data networks." Thesis, Queensland University of Technology, 1987. https://eprints.qut.edu.au/36825/1/36825_Rigby_1987.pdf.

Повний текст джерела
Анотація:
Key management is one of the major proolem areas in today's secure data communications networks. Many of the problems may be solved with a device known as a security module. The security module must be designed to meet the requirements of a key management system, and also be capable of preventing abuses of it. It has been discovered that rule-based programming languages are particularly suited to modelling the functionality of security modules and their role in cryptographic key management. In this work automated techniques for analyzing security systems which employ security modules are prese
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Chen, Lei Lee Chung-wei. "On secure media streaming with path diversity in MANETs." Auburn, Ala., 2007. http://repo.lib.auburn.edu/Send%2002-04-08/CHEN_LEI_20.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Sullivan, Mark P. "Secure remote network administration and power management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSullivan.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Kim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Dong, Renren. "Secure multiparty computation." Bowling Green, Ohio : Bowling Green State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1241807339.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Guerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.

Повний текст джерела
Анотація:
<p>Sensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.</p><p>In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communicatio
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Повний текст джерела
Анотація:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and ma
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Karadag, Gokdeniz. "Secure Communication Channel Mechanisms For Isolated Networks." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611436/index.pdf.

Повний текст джерела
Анотація:
Current network security solutions are consisted of a single host, with network interfaces of the host connected to protected and external networks at the same time. This design ensures security by restricting traffic flow to a single point, where it can be examined and acted on by a set of rules. However, this design also has a flaw and a single point of failure, that being the vulnerabilities in the security device itself. An adversary would have unhindered access to protected networks if a vulnerability in the security device itself leads to its compromise. To prevent this possibility, hig
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Alhakami, Wajdi. "Secure MAC protocols for cognitive radio networks." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/621831.

Повний текст джерела
Анотація:
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present sev
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Okano, Stephen Hiroshi. "Optimizing secure communication standards for disadvantaged networks." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/61316.

Повний текст джерела
Анотація:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 137-140).<br>We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their relevance to disadvantaged networks. Then we offer methods to reduce message overhead in packing Cryptographic Message Syntax (CMS) structures by using ZLIB compression
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Roy, Sankardas. "Secure data aggregation in wireless sensor networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3360.

Повний текст джерела
Анотація:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 124. Thesis directors: Sushil Jajodia, Sanjeev Setia Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 120-123). Also issued in print.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Alzaid, Hani Mohammed. "Secure data aggregation in wireless sensor networks." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41843/1/Hani_Alzaid_Thesis.pdf.

Повний текст джерела
Анотація:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Saleh, Mohammad. "Secure communications in wireless networks for biomedical EEG sensor networks applications." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA024/document.

Повний текст джерела
Анотація:
Le cadre général de la thèse concerne les réseaux de capteurs et la sécurisation des communications sans fil pour la mise en œuvre de systèmes fiables de surveillance orienté santé. Plus précisément, ce travail de thèse présente un nouveau système de surveillance biomédical à base de réseau de capteurs sans fil, pour la mesure de l'activité électrique du cerveau. Un réseau de capteurs sans fil de type EEG (électroencéphalogramme) permet de surveiller les ondes cérébrales spontanées, y compris les ondes normales et anormales, des patients souffrant de différents types d'épilepsie. Un capteur sa
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Chim, Tat-wing, and 詹達榮. "Secure and privacy-preserving protocols for VANETs." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587755.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Koneru, Sindoora. "SECURE BANDWIDTH EFFICIENT MULTICASTING FOR WIDE AREA NETWORKS." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/theses/170.

Повний текст джерела
Анотація:
Recently an efficient multicasting protocol has been reported which uses a concept known as pseudo diameter to reduce the number of duplicate packets generated during multicasting in wide area networks (WANs). This work is superior to the Distance Vector Multicast Routing protocols (DVMRP) from the viewpoint of better bandwidth utilization. In this thesis security aspect of the above mentioned multicast protocol has been considered. Asymmetric key cryptography concept has been used effectively to design the protocol.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Pandey, Santosh Agrawal Prathima. "Secure localization and node placement strategies for wireless networks." Auburn, Ala., 2007. http://hdl.handle.net/10415/1388.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Gin, Andrew. "Building a Secure Short Duration Transaction Network." Thesis, University of Canterbury. Computer Science and Software Engineering, 2007. http://hdl.handle.net/10092/1188.

Повний текст джерела
Анотація:
The objective of this project was to design and test a secure IP-based architecture suitable for short duration transactions. This included the development of a prototype test-bed in which various operating scenarios (such as cryptographic options, various IP-based architectures and fault tolerance) were demonstrated. A solution based on SIP secured with TLS was tested on two IP based architectures. Total time, CPU time and heap usage was measured for each architecture and encryption scheme to examine the viability of such a solution. The results showed that the proposed solution stack was abl
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Antolino, Rivas David. "Reputation systems and secure communication in vehicular networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/117532.

Повний текст джерела
Анотація:
A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing so, they constrain the ad-hoc nature of the VANET imposing a frequent connection to the CA to retrieve the Certificate Revocation List (CRL) and requiring some degree of roadside infrastructure to achieve that connection. Other solutions propose the usage of group signatures where users organize in groups and elect a group manager. The group manager will need to ensure that
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Vogt, Harald. "Protocols for secure communication in wireless sensor networks /." Zürich : ETH, 2009. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18174.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Uluagac, Arif Selcuk. "A secure communication framework for wireless sensor networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34713.

Повний текст джерела
Анотація:
Today, wireless sensor networks (WSNs) are no longer a nascent technology and future networks, especially Cyber-Physical Systems (CPS) will integrate more sensor-based systems into a variety of application scenarios. Typical application areas include medical, environmental, military, and commercial enterprises. Providing security to this diverse set of sensor-based applications is necessary for the healthy operations of the overall system because untrusted entities may target the proper functioning of applications and disturb the critical decision-making processes by injecting false informatio
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Ren, Yonglin. "Towards Secure and Trustworthy Wireless Ad hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22909.

Повний текст джерела
Анотація:
Due to the attractive advantages of wireless communication technologies, wireless networking and mobile computing has developed expeditiously and gained ample prevalence. Thereby, many practical applications are being designed for the use of wireless ad hoc networks in both military and civilian scenarios. However, some security concerns have arisen from such networks, especially in that misbehaving nodes pose a major threat during the construction of a trusted network. Therefore, security is one of the key challenges in wireless ad hoc networks, requiring significant attention due to their ow
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Pinto, Pedro C. (Pedro Correia). "Intrinsically secure communication in large-scale wireless networks." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60173.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 169-181).<br>The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security - widely accepted as the strictest notion of security - relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated b
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Kifayat, Kashif. "Group-based secure communication for wireless sensor networks." Thesis, Liverpool John Moores University, 2008. http://researchonline.ljmu.ac.uk/5899/.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunctional sensor nodes that are small in size and communicate over short distances. Continuous growth in the use of Wireless Sensor Networks (WSN) in sensitive applications such as military or hostile environments and also generally has resulted m a requirement for effective security mechanisms in the system design In order to protect the sensitive data and the sensor readings, shared keys should be used to encrypt the exchanged messages between communicating nodes. Many key management schemes have
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Biswas, Kamanashis. "Energy Efficient Secure Routing in Wireless Sensor Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/365658.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSNs) can contain thousands of small, inexpensive sensors that are randomly deployed in open and harsh environments to collect data. The short lifespan of the battery-operated sensors and the hostile environments necessitate the development of energy ecient and secure protocols in sensor networks. Among the wide variety of network protocols, routing plays the most signicant role in energy consumption since 70% of the total energy is consumed for data transmission in WSNs. Therefore, it is necessary to design energy ecient routing schemes to conserve energy and prolong
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.

Повний текст джерела
Анотація:
2009 - 2010<br>Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Brahmadesam, Murali M. "Framework for scalable secure source specific multicast." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000509.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Singh, Aameek. "Secure Management of Networked Storage Services: Models and Techniques." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-04092007-004039/.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008.<br>Liu, Ling, Committee Chair ; Aberer, Karl, Committee Member ; Ahamad, Mustaque, Committee Member ; Blough, Douglas, Committee Member ; Pu, Calton, Committee Member ; Voruganti, Kaladhar, Committee Member.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Khabbazian, Majid. "Secure and efficient wireless ad hoc networking." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2847.

Повний текст джерела
Анотація:
Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range and requires other nodes to act as routers in order to communicate with out-of-range estinations. One of the fundamental operations in ad hoc networks is broadcasting, where a node sends a messa
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Domingo, Prieto Marc. "Integrating secure mobile P2P systems and Wireless Sensor Networks." Doctoral thesis, Universitat Oberta de Catalunya, 2017. http://hdl.handle.net/10803/404534.

Повний текст джерела
Анотація:
Aquesta tesi tracta de les diferents limitacions trobades a WSN per a habilitar-ne el desplegament en nous escenaris i facilitar la difusió de la informació obtinguda. A un nivell baix, ens centrem en el consum d’energia, mentre que, a un nivell més alt, ens focalitzem en la difusió i la seguretat de la informació. Reduïm el consum d’una mote individual en xarxes amb patrons de trànsit dinàmic mitjançant la definició d’una funció de planificació basada en el conegut controlador PID i allarguem la vida d’una WSN globalment distribuint equitativament el consum energètic de totes les motes, dismi
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Chen, Hejun. "A framework for secure mobility in wireless overlay networks." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/819.

Повний текст джерела
Анотація:
Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wir
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Li, Xu. "Secure and anonymous routing in wireless ad-hoc networks." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/26955.

Повний текст джерела
Анотація:
In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymity of the exchanged data between communicating nodes. While data encryption can protect traffic content, plain routing headers may reveal valuable information about end nodes and their relationship. The main purposes of this thesis are to study the feasibility of achieving anonymity in wireless ad-hoc networks, and to propose a secure distributed anonymous routing protocol (SDAR), which is similar to the onion routing concept used in wired networks. SDAR employs a special mechanism to establish t
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Granlund, Daniel. "Secure and scalable roaming support in heterogeneous access networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17883.

Повний текст джерела
Анотація:
Mobility support for users connecting to the Internet is an increasing trend. Different types of access networks like WiFi, CDMA, and UMTS are available, creating a heterogeneous access network environment. In the Internet today, there are a number of providers of various sizes supporting different technologies. Moving between such operators different types of authentication methods are often used interrupting ongoing services. This, in combination with lacking roaming agreements makes mobility among them with maintained connectivity and uninterrupted services difficult or even impossible.This
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Bassi, German. "Secure Communication and Cooperation in Interference-Limited Wireless Networks." Thesis, CentraleSupélec, 2015. http://www.theses.fr/2015SUPL0018/document.

Повний текст джерела
Анотація:
Dans cette thèse, nous menons une étude dans le cadre de la théorie de l'information sur deux questions importantes de la communication sans fil : l'amélioration du débit de données dans les réseaux avec interférence grâce à la coopération entre utilisateurs et le renforcement de la sécurité des transmissions à l'aide d'un signal de rétroaction.Dans la première partie de la thèse, nous nous concentrons sur le modèle le plus simple qui intègre à la fois l'interférence et la coopération, le canal à relais et interférence ou IRC (Interference Relay Channel). Notre objectif est de caractériser dan
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Chen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Taban, Gelareh. "Secure and private data aggregation in wireless sensor networks." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8884.

Повний текст джерела
Анотація:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!