Works matching DE "WIRELESS communications security"
Results: 206
Endogenous Synergistic Enhanced Self‐Powered Photodetector via Multi‐Effect Coupling Strategy toward High‐Efficiency Ultraviolet Communication.
- Published in:
- Advanced Functional Materials, 2022, v. 32, n. 33, p. 1, doi. 10.1002/adfm.202202184
- By:
- Publication type:
- Article
Polarization Modulation for Wireless Communications Based on Metasurfaces.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 36, p. 1, doi. 10.1002/adfm.202103379
- By:
- Publication type:
- Article
A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 339, doi. 10.1007/s11277-018-5691-8
- By:
- Publication type:
- Article
Impact of Primary Interference on Secrecy Performance of Physical Layer Security in Cognitive Radio Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 1099, doi. 10.1007/s11277-018-5623-7
- By:
- Publication type:
- Article
Secrecy Capacity Analysis of MIMO System over Multiple Destinations and Multiple Eavesdroppers.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 1009, doi. 10.1007/s11277-018-5363-8
- By:
- Publication type:
- Article
A Hybrid Feature Selection Method for Improved Detection of Wired/Wireless Network Intrusions.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 1853, doi. 10.1007/s11277-017-4949-x
- By:
- Publication type:
- Article
An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2665, doi. 10.1007/s11277-017-4629-x
- By:
- Publication type:
- Article
Secured Self Organizing Network Architecture in Wireless Personal Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5603, doi. 10.1007/s11277-017-4436-4
- By:
- Publication type:
- Article
Research on the Construction of the Universe Network Based on Quantum Entanglement Effect.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2021, doi. 10.1007/s11277-016-3926-0
- By:
- Publication type:
- Article
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2003, doi. 10.1007/s11277-016-3922-4
- By:
- Publication type:
- Article
Directional Modulation Using Frequency Diverse Array For Secure Communications.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2679, doi. 10.1007/s11277-017-3949-1
- By:
- Publication type:
- Article
Privacy Model for Threshold RFID System Based on PUF.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2803, doi. 10.1007/s11277-017-3965-1
- By:
- Publication type:
- Article
Research and Application of Wireless Security Monitoring System in Chemistry and Chemical Engineering Laboratory.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2331, doi. 10.1007/s11277-017-4106-6
- By:
- Publication type:
- Article
Securing Collaborative Spectrum Sensing Against Malicious Attackers in Cognitive Radio Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 75, doi. 10.1007/s11277-016-3331-8
- By:
- Publication type:
- Article
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- By:
- Publication type:
- Article
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 88, n. 2, p. 337, doi. 10.1007/s11277-015-3123-6
- By:
- Publication type:
- Article
Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 841, doi. 10.1007/s11277-015-2813-4
- By:
- Publication type:
- Article
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- By:
- Publication type:
- Article
Experimental Study to Analyze the Security Performance in Wireless LANs.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 2085, doi. 10.1007/s11277-015-2504-1
- By:
- Publication type:
- Article
Keyless Security in Wireless Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1713, doi. 10.1007/s11277-014-1954-1
- By:
- Publication type:
- Article
A Cooperative Transmission Scheme for the Secure Wireless Multicasting.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1239, doi. 10.1007/s11277-013-1563-4
- By:
- Publication type:
- Article
A Study on Convergence Security System for Preventing Leakage of Internal Information.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 2, p. 175, doi. 10.1007/s11277-013-1228-3
- By:
- Publication type:
- Article
ПОЛІТИКА РОСІЙСЬКОЇ ФЕДЕРАЦІЇ У СХІДНОЄВРОПЕЙСЬКОМУ РЕГІОНАЛЬНОМУ КОМПЛЕКСІ БЕЗПЕКИ
- Published in:
- Hileya: Scientific Bulletin / Gileya, 2020, n. 156, p. 318
- By:
- Publication type:
- Article
人工噪声辅助的多用户安全传输方法.
- Published in:
- Telecommunication Engineering, 2022, v. 62, n. 3, p. 348, doi. 10.3969/j.issn.1001-893x.2022.03.012
- By:
- Publication type:
- Article
Design and Performance Analysis of Massive MIMO Modeling with Reflected Intelligent Surface to Enhance the Capacity of 6G Networks.
- Published in:
- Engineering, Technology & Applied Science Research, 2023, v. 13, n. 6, p. 12068, doi. 10.48084/etasr.6234
- By:
- Publication type:
- Article
Wireless communications sensing and security above 100 GHz.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-36621-x
- By:
- Publication type:
- Article
STUDENTS AWARENESS TOWARD MOBILE WIRELESS TECHNOLOGIES SECURITY ISSUES AT COLLEGE OF COMPUTER SCIENCE AND COMPUTER ENGINEERING - TAIBAH UNIVERSITY.
- Published in:
- Journal of International Management Studies, 2014, v. 14, n. 3, p. 35, doi. 10.18374/jims-14-3.4
- By:
- Publication type:
- Article
On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 60, doi. 10.3390/fi17020060
- By:
- Publication type:
- Article
A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.
- Published in:
- Future Internet, 2024, v. 16, n. 2, p. 56, doi. 10.3390/fi16020056
- By:
- Publication type:
- Article
Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance.
- Published in:
- Future Internet, 2020, v. 12, n. 10, p. 170, doi. 10.3390/fi12100170
- By:
- Publication type:
- Article
Security and Privacy in Wireless and Mobile Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 2, p. 18, doi. 10.3390/fi10020018
- By:
- Publication type:
- Article
INTRODUCTION TO THE SPECIAL ISSUE: NETWORK MANAGEMENT IN DISTRIBUTED SYSTEMS.
- Published in:
- Scalable Computing: Practice & Experience, 2010, v. 11, n. 4, p. 329
- By:
- Publication type:
- Article
Wireless Security.
- Published in:
- Internal Auditor, 2002, v. 59, n. 5, p. 26
- By:
- Publication type:
- Article
Performance Enhancement of Fiber Optic and Optical Wireless Communication Channels by Using Forward Error Correction Codes.
- Published in:
- Journal of Optical Communications, 2024, v. 45, n. 1, p. s97, doi. 10.1515/joc-2019-0191
- By:
- Publication type:
- Article
Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment.
- Published in:
- Mobile Networks & Applications, 2023, v. 28, n. 6, p. 2191, doi. 10.1007/s11036-023-02176-w
- By:
- Publication type:
- Article
Optimization Schemes for Protective Jamming.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 45, doi. 10.1007/s11036-013-0483-6
- By:
- Publication type:
- Article
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2439, doi. 10.1007/s11276-024-03674-9
- By:
- Publication type:
- Article
Pilot spoofing detection based on pilot random block encryption.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 2, p. 973, doi. 10.1007/s11276-023-03539-7
- By:
- Publication type:
- Article
Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 8, p. 3479, doi. 10.1007/s11276-023-03422-5
- By:
- Publication type:
- Article
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 1, p. 403, doi. 10.1007/s11276-022-03144-0
- By:
- Publication type:
- Article
Relay selection schemes for secure transmission in cognitive radio networks.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 3, p. 911, doi. 10.1007/s11276-016-1378-9
- By:
- Publication type:
- Article
Light weight security protocol for communications in vehicular networks.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 4, p. 1343, doi. 10.1007/s11276-015-1034-9
- By:
- Publication type:
- Article
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 1693, doi. 10.32604/cmc.2023.028129
- By:
- Publication type:
- Article
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 1693, doi. 10.32604/cmc.2023.028129
- By:
- Publication type:
- Article
Directional Modulation Based on a Quantum Genetic Algorithm for a Multiple-Reflection Model.
- Published in:
- Computers, Materials & Continua, 2020, v. 64, n. 3, p. 1771, doi. 10.32604/cmc.2020.09905
- By:
- Publication type:
- Article
Secrecy Outage Probability Analysis Based on Cognitive Decode- and-Forward Relaying.
- Published in:
- Computers, Materials & Continua, 2020, v. 62, n. 3, p. 1387, doi. 10.32604/cmc.2020.06864
- By:
- Publication type:
- Article
Authentication and Secure Robot Communication.
- Published in:
- International Journal of Advanced Robotic Systems, 2014, v. 11, n. 1, p. 1, doi. 10.5772/57433
- By:
- Publication type:
- Article
Security Capacity by Nonlinear Transmission in MIMO Systems for Physical Layer Security.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 1, p. 593, doi. 10.1007/s11277-024-11437-0
- By:
- Publication type:
- Article
Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security.
- Published in:
- Wireless Personal Communications, 2024, v. 136, n. 2, p. 883, doi. 10.1007/s11277-024-11294-x
- By:
- Publication type:
- Article
RSMO: Rider Spider Monkey Optimization-Based Artificial Noise Precoding Technique for Physical Layer Security in 5G Networks.
- Published in:
- Wireless Personal Communications, 2024, v. 135, n. 4, p. 2355, doi. 10.1007/s11277-024-11166-4
- By:
- Publication type:
- Article