Works matching DE "DATA transmission system security measures"
Results: 71
LAS TRANSFERENCIAS DE DATOS A EE.UU.: LA TRANSICIÓN DEL SAFE HARBOR AL PRIVACY SHIELD Y UN PASO MÁS ALLÁ.
- Published in:
- Actualidad Jurídica (1578-956X), 2017, n. 45, p. 36
- By:
- Publication type:
- Article
Engineering Privacy.
- Published in:
- IEEE Transactions on Software Engineering, 2009, v. 35, n. 1, p. 67
- By:
- Publication type:
- Article
Security Issues Rise As Automation Gains.
- Published in:
- Financial Executive, 2005, v. 21, n. 8, p. 12
- By:
- Publication type:
- Article
Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 121, doi. 10.1007/s11036-013-0454-y
- By:
- Publication type:
- Article
Secure message transmission in the presence of a fully generalised adversary.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 4, p. 205, doi. 10.1515/jmc-2013-0046
- By:
- Publication type:
- Article
Cooperative Secure Transmission in the Presence of Untrusted Relay.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/3567323
- By:
- Publication type:
- Article
Encryption Algorithms for Data Transmission Security in Industrial Environments.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2016, v. 68, n. 4, p. 27
- By:
- Publication type:
- Article
Security issues in telemedicine.
- Published in:
- Journal of Telemedicine & Telecare, 1999, v. 5, p. 123, doi. 10.1258/1357633991932874
- By:
- Publication type:
- Article
A Robust Oblivious Watermark System base on Hybrid Error Correct Code.
- Published in:
- Journal of Multimedia, 2010, v. 5, n. 3, p. 232, doi. 10.4304/jmm.5.3.232-239
- By:
- Publication type:
- Article
Protecting Sensor Data Transmitted Wirelessly: A Grounds-Up Approach.
- Published in:
- Chemical Engineering, 2018, v. 125, n. 9, p. 44
- By:
- Publication type:
- Article
Information flow safety in multiparty sessions.
- Published in:
- Mathematical Structures in Computer Science, 2016, v. 26, n. 8, p. 1352, doi. 10.1017/S0960129514000619
- By:
- Publication type:
- Article
Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2016, v. 6, n. 6, p. 2735, doi. 10.11591/ijece.v6i6.10792
- By:
- Publication type:
- Article
Eine Frage des Niveaus: Angemessenheit drittstaatlicher Datenschutzregime im Lichte der Schlussanträge in „Schrems II" - Der Prüfungsmaßstab der Gleichwertigkeit und seine Reichweite im Bereich der nationalen Sicherheit.
- Published in:
- Computer und Recht, 2020, v. 36, n. 2, p. 82, doi. 10.9785/cr-2020-360209
- By:
- Publication type:
- Article
The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things.
- Published in:
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/2970673
- By:
- Publication type:
- Article
Public Key Infrastructure.
- Published in:
- Applied Clinical Trials, 2001, v. 10, n. 8, p. 21
- By:
- Publication type:
- Article
Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 2, p. 146, doi. 10.14429/dsj.66.9705
- By:
- Publication type:
- Article
Secure Data Transfer Using Multi Layer Security Protocol with Energy Power Consumption AODV in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3055, doi. 10.1007/s11277-018-5994-9
- By:
- Publication type:
- Article
A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 201, doi. 10.1007/s11277-018-5835-x
- By:
- Publication type:
- Article
An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- By:
- Publication type:
- Article
An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3923, doi. 10.1007/s11277-017-4359-0
- By:
- Publication type:
- Article
Text-based Steganography using Huffman Compression and AES Encryption Algorithm.
- Published in:
- Iraqi Journal of Science, 2021, v. 62, n. 11, p. 4110, doi. 10.24996/ijs.2021.62.11.31
- By:
- Publication type:
- Article
INCREASING SECURITY IN CLOUD ENVIRONMENT.
- Published in:
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2013, v. 11, n. 2, p. 237
- By:
- Publication type:
- Article
Adaptive image camouflage using human visual system model.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8311, doi. 10.1007/s11042-018-6813-8
- By:
- Publication type:
- Article
A novel hybrid security mechanism for data communication networks.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 24063, doi. 10.1007/s11042-016-4111-x
- By:
- Publication type:
- Article
A reversible data hiding scheme for VQ indices using histogram shifting of prediction errors.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 4, p. 6031, doi. 10.1007/s11042-015-3142-z
- By:
- Publication type:
- Article
Data hiding of high compression ratio in VQ indices with neighboring correlations.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 5, p. 1645, doi. 10.1007/s11042-014-2019-x
- By:
- Publication type:
- Article
A novel image cipher based on mixed transformed logistic maps.
- Published in:
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 315, doi. 10.1007/s11042-010-0652-6
- By:
- Publication type:
- Article
Least Significant Bit (LSB) Steganography Technique on Digital PNG Formatted Images.
- Published in:
- ESTEEM, 2018, v. 14, p. 45
- By:
- Publication type:
- Article
Power allocation design and optimization for secure transmission in cognitive relay networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5133, doi. 10.1002/sec.1683
- By:
- Publication type:
- Article
Dynamic spectrum access-based cryptosystem for cognitive radio networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4151, doi. 10.1002/sec.1595
- By:
- Publication type:
- Article
Dynamic Hash key-based stream cipher for secure transmission of real time ECG signal.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4391, doi. 10.1002/sec.1615
- By:
- Publication type:
- Article
On decentralized group key management mechanism for vehicular ad hoc networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 3, p. 241, doi. 10.1002/sec.541
- By:
- Publication type:
- Article
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 6, p. 1026, doi. 10.1002/sec.1057
- By:
- Publication type:
- Article
Secrecy coding for the binary symmetric wiretap channel.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 8, p. 966, doi. 10.1002/sec.230
- By:
- Publication type:
- Article
QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 287, doi. 10.26483/ijarcs.v9i2.5673
- By:
- Publication type:
- Article
ENHANCED SECURITY FOR DATA TRANSFER IN CLOUD.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 270, doi. 10.26483/ijarcs.v9i2.5569
- By:
- Publication type:
- Article
SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- By:
- Publication type:
- Article
A COPYRIGHT PROTECTION OF DATA OVER INTERNET BY USING WATERMARKING.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 240, doi. 10.26483/ijarcs.v9i2.5521
- By:
- Publication type:
- Article
AN ENHANCED ADVANCED ENCRYPTION STANDARD (EAES) ALGORITHM FOR SECURE FIBER OPTIC COMMUNICATION.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 167, doi. 10.26483/ijarcs.v9i1.5285
- By:
- Publication type:
- Article
IMPLEMENTATION OF JSMEA (JOINT SELECTIVE MULTIMEDIA ENCRYPTION ALGORITHM) - A PRIVACY ENHANCING STRATEGY.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 266, doi. 10.26483/ijarcs.v8i9.5012
- By:
- Publication type:
- Article
STEGANOGRAPHIC METHOD BY MATHEMATICAL ODD-EVEN SEQUENCE.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1122, doi. 10.26483/ijarcs.v8i7.4446
- By:
- Publication type:
- Article
Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 254
- By:
- Publication type:
- Article
A Short Range Wireless Network: Bluetooth.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 37
- By:
- Publication type:
- Article
Development of Semantic Analyzer for Audio Steganography Using Spread Spectrum Technique.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 144
- By:
- Publication type:
- Article
Neighborhood Watch: What Your Utility Meter May Be Saying About You.
- Published in:
- Journal: American Water Works Association, 2013, v. 105, n. 6, p. 18, doi. 10.5942/jawwa.2013.105.0091
- By:
- Publication type:
- Article
SECRECYIS DEAD - LONG LIVE TRADE SECRETS.
- Published in:
- Denver Law Review, 2016, v. 93, n. 4, p. 833
- By:
- Publication type:
- Article
ANALYSIS AND COMPARISON OF DES CRYPTOGRAPHIC ALGORITHM AND AES CRYPTOGRAPHIC ALGORITHM IN DIFFERENT CPU.
- Published in:
- International Journal of Science, Innovation & New Technology, 2016, v. 1, n. 16, p. 25
- By:
- Publication type:
- Article
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 812, doi. 10.1007/s12083-015-0361-z
- By:
- Publication type:
- Article
Providing security and fault tolerance in P2P connections between clouds for mHealth services.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 876, doi. 10.1007/s12083-015-0378-3
- By:
- Publication type:
- Article
Collaborative and secure transmission of medical data applied to mobile healthcare.
- Published in:
- 2019
- By:
- Publication type:
- journal article