>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-13 共查到Secure Communication相关记录13条 . 查询时间(0.124 秒)
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
To advance the technology necessary for secure communication, the National Science Foundation (NSF) has awarded $12 million to develop systems that use photons in pre-determined quantum states as a wa...
Security features are of paramount importance for IoT, and implementations are challenging given the resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitab...
shared random strings are either communicated or recreated algorithmically in “pseudo” mode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
A secure reverse firewall, as recently defined by Mironov and Stephens-Davidowitz, is a third party thatsits between a user and the outside world” and modifies the users sent and received message...
Mechanisms for secure mobile communication can be enablers for novel applications in the area of cooperative work. In this context, this article exemplarily investigates an emergency management settin...
We investigate the problem of secure communication over the parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of m...
In the problem of perfectly reliable message transmission (PRMT), a sender S and a receiver R are connected by n bidirectional synchronous channels. A mixed adversary A(tb;tf ;tp) with infinite comp...
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of whic...
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ...
2007Vol.47No.6pp.1076-1080DOI: Bi-directional Secure Communication Based on Discrete Chaotic Synchronization LONG Min,1 QIU Shui-Sheng,2 and PENG Fei3 1 College of Compu...
2005Vol.44No.6pp.1115-1124DOI: A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System ZHANG Xiao-Hong1,2 and MIN Le-Quan1 ...
2004Vol.41No.4pp.632-640DOI: Approach to Generalized Synchronization with Application to Chaos-Based Secure Communication MIN Le-Quan,1 CHEN Guan-Rong,2 ZHANG Xiao-Dan,1 ZHANG ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...