Search

Your search keyword '"telecommunication security"' showing total 2,202 results

Search Constraints

Start Over You searched for: Descriptor "telecommunication security" Remove constraint Descriptor: "telecommunication security"
2,202 results on '"telecommunication security"'

Search Results

301. Channel correlation‐based relay attack avoidance in vehicle keyless‐entry systems.

302. Symbol separation and beamforming to improve secure transmission in multi‐untrusted relay networks.

303. Performance analysis of one‐step prediction‐based cognitive jamming in jammer‐radar countermeasure model

304. Computationally efficient mutual authentication protocol for remote infant incubator monitoring system

305. Detecting new generations of threats using attribute‐based attack graphs

306. Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm

307. Efficient proxy ring signature for VANET

308. Mitigating information leakage during critical communication using S*FSM

309. An Effective SDN Controller Scheduling Method to Defence DDoS Attacks

310. Secure degrees of freedom of two‐user X‐channel with synergistic alternating channel state information at transmitters

311. MANUFACTURERS & SERVICE PROVIDERS.

312. Enabling seamless V2I communications: toward developing cooperative automotive applications in VANET systems.

313. Standards news.

314. Cooperation strategies for vehicular delay-tolerant networks.

315. Enhancements of V2X communication in support of cooperative autonomous driving.

316. Reliable and efficient autonomous driving: the need for heterogeneous vehicular networks.

317. Secrecy beyond encryption: obfuscating transmission signatures in wireless communications.

318. Enhancing wireless secrecy via cooperation: signal design and optimization.

319. Multi-antenna relay aided wireless physical layer security.

320. Non-existence of Isolated Nodes in Secure Wireless Sensor Network.

321. Geodiverse Routing with Path Delay and Skew Requirement Under Area-Based Challenges.

322. Secure communication in cooperative network with wireless information and power transfer.

323. GBAAM: group-based access authentication for MTC in LTE networks.

324. Issue Information.

325. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system.

326. Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue].

327. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints.

328. Information Security Modeling for the Operation of a Novel Highly Trusted Network in a Virtualization Environment.

329. On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism.

330. Privacy of a randomised skip lists‐based protocol.

331. The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-commerce, and the New Media.

332. Approximability of minimum certificate dispersal with tree structures.

333. Efficient authenticated key exchange protocols for wireless body area networks.

334. Novel Chaos Secure Communication System Based on Walsh Code.

335. Automatic Monitoring of Converged Services on a Telco 2.0 Environment based on QoS Constraints.

336. A Compact Readout Electronics for the Ground Station of a Quantum Communication Satellite.

337. Synchronization of Fuzzy Modeling Chaotic Time Delay Memristor-Based Chua's Circuits with Application to Secure Communication.

338. SIR: a secure and intelligent routing protocol for vehicular ad hoc network.

339. A Secured Key Distribution for Effective File Transfer Using HMAC-SHA Algorithm with Self-Healing Property.

340. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs.

341. On cross-correlation properties of S-boxes and their design using semi-bent functions.

342. Mahalanobis distance similarity measure based distinguisher for template attack.

343. A new efficient signcryption scheme in the standard model.

344. A new certificateless signature scheme under enhanced security models.

345. Attribute-based signature for threshold predicates from lattices.

346. E-correlator: an entropy-based alert correlation system.

347. A Private Secure Communication Scheme Using UKF-based Chaos Synchronization.

348. An improved authentication scheme for mobile satellite communication systems.

349. Polar coding for the wiretap broadcast channel with multiple messages

350. Authentication protocol for an ambient assisted living system.

Catalog

Books, media, physical & digital resources