Search

Your search keyword '"Secure Communication"' showing total 7,589 results

Search Constraints

Start Over You searched for: Descriptor "Secure Communication" Remove constraint Descriptor: "Secure Communication"
7,589 results on '"Secure Communication"'

Search Results

1. Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level.

2. Hybrid quantum key distribution: A novel approach for secure end-to-end communication in network infrastructure.

3. A Dual‐Polarization Programmable Metasurface for Green and Secure Wireless Communication.

4. Application of optimizing advanced encryption standard encryption algorithm in secure communication of vehicle controller area network bus.

5. Resource allocation and offloading decision for secure UAV-based MEC wireless-powered System.

6. An Effective Mechanism for FOG Computing Assisted Function Based on Trustworthy Forwarding Scheme (IOT).

8. Efficient and quantum‐secure authenticated key exchange scheme for mobile satellite communication networks.

9. Effect of nonlinear properties of chaotic systems on the behavior of semiconductor lasers.

10. Trust-based co-operative routing for secure communication in mobile ad hoc networks

11. Echo State Networks for Cryptography: A Novel Framework for Key Generation and Secure Communication

13. Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit

14. A Review of Authentication Schemes in Internet of Things

16. Quantum Resilience and Distributed Trust: The Promise of Blockchain and Quantum Computing in Defense

18. QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems

19. Efficient Data Management in Agricultural IoT: Compression, Security, and MQTT Protocol Analysis.

20. Cooperative networking and information processing system of wireless communication UAV under the background of intelligent service.

21. Sliding mode synchronization of uncertain memristor cellular neural network and application in secure communication.

22. Enhancing the Secure Transmission of Data Over Optical Fiber Networks from Source to Destination.

23. 基于动态密钥的车载以太网安全通信方法.

24. Finite-time synchronization of delayed semi-Markov reaction–diffusion systems: An asynchronous boundary control scheme.

25. Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications.

26. A novel secure communication system using optoelectronic feedback in semiconductor laser.

27. A Dual‐Polarization Programmable Metasurface for Green and Secure Wireless Communication

30. Multisecret‐sharing scheme with two‐level security and its applications in blockchain

31. Integrating Energy Harvesting, Anti-Eavesdropping, and Communication in a Hybrid Beamforming System

32. An Enhanced Location-Aided Ant Colony Routing for Secure Communication in Vehicular Ad Hoc Networks

33. Harnessing optical advantages in computing: a review of current and future trends.

34. Selective bin model for reversible data hiding in encrypted images.

35. An n -Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.

36. SECURING AND ADVANCING ROAD SAFETY IN INTELLIGENT VEHICULAR NETWORKS FOR SEAMLESS AND SECURE COMMUNICATION.

37. Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem.

38. An Enhanced Location-Aided Ant Colony Routing for Secure Communication in Vehicular Ad Hoc Networks.

39. Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption.

40. Real-Time Synchronisation of Multiple Fractional-Order Chaotic Systems: An Application Study in Secure Communication.

41. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

42. 基于多 IRS 辅助的 MU-MISO 系统安全通信方案.

43. Multifaceted Coding of Messages Using the Concepts of Graph Theory.

44. Synchronization and Application of a Novel Hyperchaotic System Based on Adaptive Observers.

45. Adaptive finite-time synchronisation of variable-order fractional chaotic systems for secure communication.

46. Self‐adaptive search optimization‐based vehicle path prediction and traffic light controller in vehicular ad hoc network.

47. A New Memristive System with Extreme Multistability and Hidden Chaotic Attractors and with Application to Image Encryption.

48. A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks.

49. Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping.

50. 含大范围参数四维混沌系统的吸引子共存.

Catalog

Books, media, physical & digital resources