Works matching DE "DATA transmission system security measures"
Results: 72
Secure Data Transfer Using Multi Layer Security Protocol with Energy Power Consumption AODV in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3055, doi. 10.1007/s11277-018-5994-9
- By:
- Publication type:
- Article
A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 201, doi. 10.1007/s11277-018-5835-x
- By:
- Publication type:
- Article
An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- By:
- Publication type:
- Article
An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3923, doi. 10.1007/s11277-017-4359-0
- By:
- Publication type:
- Article
Safe Data Transmission Architecture Based on Cloud for Internet of Things.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 287, doi. 10.1007/s11277-015-3063-1
- By:
- Publication type:
- Article
Least Significant Bit (LSB) Steganography Technique on Digital PNG Formatted Images.
- Published in:
- ESTEEM, 2018, v. 14, p. 45
- By:
- Publication type:
- Article
Information flow safety in multiparty sessions.
- Published in:
- Mathematical Structures in Computer Science, 2016, v. 26, n. 8, p. 1352, doi. 10.1017/S0960129514000619
- By:
- Publication type:
- Article
Cooperative Secure Transmission in the Presence of Untrusted Relay.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/3567323
- By:
- Publication type:
- Article
BSM: Broadcasting of Safety Messages in Vehicular Ad Hoc Networks.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 2, p. 777, doi. 10.1007/s13369-013-0686-y
- By:
- Publication type:
- Article
Protecting Sensor Data Transmitted Wirelessly: A Grounds-Up Approach.
- Published in:
- Chemical Engineering, 2018, v. 125, n. 9, p. 44
- By:
- Publication type:
- Article
IFS: Intelligent flow sampling for network security-an adaptive approach.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 5, p. 263, doi. 10.1002/nem.1902
- By:
- Publication type:
- Article
Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 121, doi. 10.1007/s11036-013-0454-y
- By:
- Publication type:
- Article
Risk Assessment of a Power Plant: Evaluating the Security of a Supervisory Control and Data Acquisition System.
- Published in:
- ASHRAE Transactions, 2006, v. 112, n. 2, p. 671
- By:
- Publication type:
- Article
Secure Group Communication with Hidden Group Key.
- Published in:
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 1, p. 21, doi. 10.1080/19393555.2013.780272
- By:
- Publication type:
- Article
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 243, doi. 10.1080/19393555.2010.499799
- By:
- Publication type:
- Article
Host-Based Security Challenges and Controls: A Survey of Contemporary Research.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 170, doi. 10.1080/19393550802369800
- By:
- Publication type:
- Article
A Secured Key Distribution for Effective File Transfer Using HMAC-SHA Algorithm with Self-Healing Property.
- Published in:
- Journal of Applied Security Research, 2015, v. 10, n. 2, p. 221, doi. 10.1080/19361610.2015.1004512
- By:
- Publication type:
- Article
Authentication and Key Establishment in Dynamic Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2010, v. 10, n. 4, p. 3718, doi. 10.3390/s100403718
- By:
- Publication type:
- Article
Text-based Steganography using Huffman Compression and AES Encryption Algorithm.
- Published in:
- Iraqi Journal of Science, 2021, v. 62, n. 11, p. 4110, doi. 10.24996/ijs.2021.62.11.31
- By:
- Publication type:
- Article
SECRECYIS DEAD - LONG LIVE TRADE SECRETS.
- Published in:
- Denver Law Review, 2016, v. 93, n. 4, p. 833
- By:
- Publication type:
- Article
Public Key Infrastructure.
- Published in:
- Applied Clinical Trials, 2001, v. 10, n. 8, p. 21
- By:
- Publication type:
- Article
Improved Mutual Authentication in VANETs.
- Published in:
- Adhoc & Sensor Wireless Networks, 2018, v. 42, n. 1/2, p. 63
- By:
- Publication type:
- Article
Efficient quantum cryptography technique for key distribution.
- Published in:
- Journal Européen des Systèmes Automatisés, 2018, v. 51, n. 4-6, p. 283, doi. 10.3166/JESA.51.283-293
- By:
- Publication type:
- Article
Securing Data Communication in Wireless Body Area Networks Using Digital Signatures.
- Published in:
- Technical Journal of University of Engineering & Technology Taxila, 2018, v. 23, n. 2, p. 50
- By:
- Publication type:
- Article
Survey on Physical Layer Security in Downlink Networks.
- Published in:
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 1, p. 14, doi. 10.6109/jicce.2017.15.1.14
- By:
- Publication type:
- Article
Security Issues Rise As Automation Gains.
- Published in:
- Financial Executive, 2005, v. 21, n. 8, p. 12
- By:
- Publication type:
- Article
Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2016, v. 6, n. 6, p. 2735, doi. 10.11591/ijece.v6i6.10792
- By:
- Publication type:
- Article
Security issues in telemedicine.
- Published in:
- Journal of Telemedicine & Telecare, 1999, v. 5, p. 123, doi. 10.1258/1357633991932874
- By:
- Publication type:
- Article
LAS TRANSFERENCIAS DE DATOS A EE.UU.: LA TRANSICIÓN DEL SAFE HARBOR AL PRIVACY SHIELD Y UN PASO MÁS ALLÁ.
- Published in:
- Actualidad Jurídica (1578-956X), 2017, n. 45, p. 36
- By:
- Publication type:
- Article
Optimal nonlinear observers for chaotic synchronization with message embedded.
- Published in:
- Nonlinear Dynamics, 2010, v. 61, n. 4, p. 623, doi. 10.1007/s11071-010-9675-9
- By:
- Publication type:
- Article
The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things.
- Published in:
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/2970673
- By:
- Publication type:
- Article
Encryption Algorithms for Data Transmission Security in Industrial Environments.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2016, v. 68, n. 4, p. 27
- By:
- Publication type:
- Article
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 812, doi. 10.1007/s12083-015-0361-z
- By:
- Publication type:
- Article
Providing security and fault tolerance in P2P connections between clouds for mHealth services.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 876, doi. 10.1007/s12083-015-0378-3
- By:
- Publication type:
- Article
A Robust Oblivious Watermark System base on Hybrid Error Correct Code.
- Published in:
- Journal of Multimedia, 2010, v. 5, n. 3, p. 232, doi. 10.4304/jmm.5.3.232-239
- By:
- Publication type:
- Article
ANALYSIS AND COMPARISON OF DES CRYPTOGRAPHIC ALGORITHM AND AES CRYPTOGRAPHIC ALGORITHM IN DIFFERENT CPU.
- Published in:
- International Journal of Science, Innovation & New Technology, 2016, v. 1, n. 16, p. 25
- By:
- Publication type:
- Article
QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 287, doi. 10.26483/ijarcs.v9i2.5673
- By:
- Publication type:
- Article
ENHANCED SECURITY FOR DATA TRANSFER IN CLOUD.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 270, doi. 10.26483/ijarcs.v9i2.5569
- By:
- Publication type:
- Article
SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- By:
- Publication type:
- Article
A COPYRIGHT PROTECTION OF DATA OVER INTERNET BY USING WATERMARKING.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 240, doi. 10.26483/ijarcs.v9i2.5521
- By:
- Publication type:
- Article
AN ENHANCED ADVANCED ENCRYPTION STANDARD (EAES) ALGORITHM FOR SECURE FIBER OPTIC COMMUNICATION.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 167, doi. 10.26483/ijarcs.v9i1.5285
- By:
- Publication type:
- Article
IMPLEMENTATION OF JSMEA (JOINT SELECTIVE MULTIMEDIA ENCRYPTION ALGORITHM) - A PRIVACY ENHANCING STRATEGY.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 266, doi. 10.26483/ijarcs.v8i9.5012
- By:
- Publication type:
- Article
STEGANOGRAPHIC METHOD BY MATHEMATICAL ODD-EVEN SEQUENCE.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1122, doi. 10.26483/ijarcs.v8i7.4446
- By:
- Publication type:
- Article
Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 254
- By:
- Publication type:
- Article
A Short Range Wireless Network: Bluetooth.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 37
- By:
- Publication type:
- Article
Development of Semantic Analyzer for Audio Steganography Using Spread Spectrum Technique.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 144
- By:
- Publication type:
- Article
Secure message transmission in the presence of a fully generalised adversary.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 4, p. 205, doi. 10.1515/jmc-2013-0046
- By:
- Publication type:
- Article
Making It Trustable: Acoustic-Based Signcryption Mutual Authentication for Multiwearable Devices.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/846739
- By:
- Publication type:
- Article
Eine Frage des Niveaus: Angemessenheit drittstaatlicher Datenschutzregime im Lichte der Schlussanträge in „Schrems II" - Der Prüfungsmaßstab der Gleichwertigkeit und seine Reichweite im Bereich der nationalen Sicherheit.
- Published in:
- Computer und Recht, 2020, v. 36, n. 2, p. 82, doi. 10.9785/cr-2020-360209
- By:
- Publication type:
- Article
A New and Secure Cryptosystem for Image Encryption and Decryption.
- Published in:
- IETE Journal of Research, 2011, v. 57, n. 2, p. 165, doi. 10.4103/0377-2063.81745
- By:
- Publication type:
- Article