Showing 461 - 480 results of 574 for search '"communications security"', query time: 0.55s Refine Results
  1. 461
  2. 462
  3. 463
  4. 464
  5. 465
  6. 466
  7. 467

    Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel by Daniel Christian Lawo, Rana Abu Bakar, Abraham Cano Aguilera, Filippo Cugini, José Luis Imaña, Idelfonso Tafur Monroy, Juan Jose Vegas Olmos

    Published 2024-08-01
    “…This case represents a mobile device that communicates securely with applications running in the cloud.…”
    Get full text
    Article
  8. 468

    Метод решения обратных задач экономического анализа на основе статистических данных by Ekaterina Gribanova, Paula E. Tugar-ool

    Published 2017-09-01
    “…The article presents an example of the application of this method to solve the modeling problem of rating the Republic of Tuva, which is based on eight groups of indicators: the standard of living, financial security, agricultural production efficiency, construction efficiency, the availability of labor resources, health, security education, and the technology for information and communication security. Using this method has allowed us to answer the question of how it is possible to increase the integral characteristics of the regional socio-economic development by 4.68%. …”
    Get full text
    Article
  9. 469

    Wireless key generation system for internet of vehicles based on deep learning by Han WANG, Liquan CHEN, Zhongmin WANG, Tianyu LU

    Published 2024-02-01
    “…In recent years, the widespread application of internet of vehicles technology has garnered attention due to its complex nature and point-to-point communication characteristics.Critical and sensitive vehicle information is transmitted between different devices in internet of vehicles, necessitating the establishment of secure and reliable lightweight keys for encryption and decryption purposes in order to ensure communication security.Traditional key generation schemes have limitations in terms of flexibility and expandability within the vehicle network.A popular alternative is the physical layer key generation technology based on wireless channels, which offers lightweight characteristics and a theoretical basis of security in information theory.However, in the context of internet of vehicles, the movement speed of devices impacts the autocorrelation of generated keys, requiring improvements to traditional channel modeling methods.Additionally, the randomness and consistency of generated wireless keys are of higher importance in applications in internet of vehicles.This research focused on a key generation system based on the wireless physical layer, conducting channel modeling based on line-of-sight and multipath fading effects to reflect the impact of vehicle speed on autocorrelation.To enhance the randomness of key generation, a differential quantization method based on cumulative distribution function was proposed.Furthermore, an information reconciliation scheme based on neural network auto-encoder was introduced to achieve a dynamic balance between reliability and confidentiality.Compared to the implementation of Slepian-Wolf low-density parity-check codes, the proposed method reduces the bit disagreement rate by approximately 30%.…”
    Get full text
    Article
  10. 470

    An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network by Muktar Yahuza, Mohd Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Tarak Nandy, Ismail Bin Ahmedy, Roziana Ramli

    Published 2021-01-01
    “…The communication entities of the IoD network can communicate securely with the use of authenticated key agreement (AKA) based techniques. …”
    Get full text
    Article
  11. 471

    Analisis Perbandingan Quality of Service Modul FXS dengan Internet Telephony Gateway by Fathony Ilham Eka Putra

    Published 2020-03-01
    “…The use of telephones in agency generally uses PBX system because it has advantages in cost, flexibility, and communication security. With the development of the era, the technology of PBX devices must be updated, but there is a solution besides updating the device, which is to add modules or devices while still using the existing PBX. …”
    Get full text
    Article
  12. 472

    A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting by Tsung-Hung Lin, Chen-Kun Tsung, Tian-Fu Lee, Zeng-Bo Wang

    Published 2017-12-01
    “…Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. …”
    Get full text
    Article
  13. 473

    Iran’s Cyber Capabilities and Assessing Security Standards for Popular Iranian Websites by Mohsen Abdollahzadeh Aghbolagh, Andrey I. Trufanov

    Published 2023-02-01
    “…One of the most important factors are to follow security standards and use of reliable and updated technology as well as the standards and technologies that have been created in recent years specifically to increase data and communication security on websites and various internet services. …”
    Get full text
    Article
  14. 474

    A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems by Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel

    Published 2019-01-01
    “…Communication security deals with attributes such as confidentiality, integrity, and availability. …”
    Get full text
    Article
  15. 475

    A Review of Intelligent Connected Vehicle Cooperative Driving Development by Biyao Wang, Yi Han, Siyu Wang, Di Tian, Mengjiao Cai, Ming Liu, Lujia Wang

    Published 2022-10-01
    “…In the case of taking the infrastructure as the object, this paper expounds the communication security, communication delay, and communication optimization algorithm of the vehicle terminal and the road terminal of intelligent connected vehicles. …”
    Get full text
    Article
  16. 476

    Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment by Zhili Zhou, Yi Cao, Meimin Wang, Enming Fan, Q. M. Jonathan Wu

    Published 2019-01-01
    “…Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure key distribution possible. …”
    Get full text
    Article
  17. 477

    Wireless key generation system for internet of vehicles based on deep learning by Han WANG, Liquan CHEN, Zhongmin WANG, Tianyu LU

    Published 2024-02-01
    “…In recent years, the widespread application of internet of vehicles technology has garnered attention due to its complex nature and point-to-point communication characteristics.Critical and sensitive vehicle information is transmitted between different devices in internet of vehicles, necessitating the establishment of secure and reliable lightweight keys for encryption and decryption purposes in order to ensure communication security.Traditional key generation schemes have limitations in terms of flexibility and expandability within the vehicle network.A popular alternative is the physical layer key generation technology based on wireless channels, which offers lightweight characteristics and a theoretical basis of security in information theory.However, in the context of internet of vehicles, the movement speed of devices impacts the autocorrelation of generated keys, requiring improvements to traditional channel modeling methods.Additionally, the randomness and consistency of generated wireless keys are of higher importance in applications in internet of vehicles.This research focused on a key generation system based on the wireless physical layer, conducting channel modeling based on line-of-sight and multipath fading effects to reflect the impact of vehicle speed on autocorrelation.To enhance the randomness of key generation, a differential quantization method based on cumulative distribution function was proposed.Furthermore, an information reconciliation scheme based on neural network auto-encoder was introduced to achieve a dynamic balance between reliability and confidentiality.Compared to the implementation of Slepian-Wolf low-density parity-check codes, the proposed method reduces the bit disagreement rate by approximately 30%.…”
    Get full text
    Article
  18. 478

    LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm by Chengkai Tang, Jiawei Ding, Lingling Zhang

    Published 2024-03-01
    “…This has become an urgent issue in the field of communication security. To combat and prevent abnormal and illegal communication activities using LEO satellites, this study proposes a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm. …”
    Get full text
    Article
  19. 479

    A comprehensive survey on an IoT-based smart public street lighting system application for smart cities by Siwar Khemakhem, Lotfi Krichen

    Published 2024-09-01
    “…The implementation of IoT-based smart public street lighting systems presents several challenges, including integrating diverse sensors and actuators ensuring robust device communication, secure data management, and effective system scaling and maintenance. …”
    Get full text
    Article
  20. 480

    Czechoslovak and Polish intelligence (cryptologic) services at the time of the institutionalisation of both states and their armies after 1918 by Daniel Kyselka, Marcela Efmertová

    Published 2024-07-01
    “…To find out the form and extent of the education of intelligence (cryptologic) personnel, which takes place at different types of higher (technical, military) schools in theoretical and practical fields, and their results applied in the activities of most of the state-controlled power apparatuses (foreign, interior, army-defense, National Security Bureau etc.), as well as in the communication (secure) channels of the state. Later, especially in the 1990s in Europe, these practices have been used outside the state apparatus in the commercial sphere. …”
    Get full text
    Article