Search

Your search keyword '"Secure transmission"' showing total 2,270 results

Search Constraints

Start Over You searched for: Descriptor "Secure transmission" Remove constraint Descriptor: "Secure transmission"
2,270 results on '"Secure transmission"'

Search Results

1. A survey to build framework for optimize and secure migration and transmission of cloud data.

2. Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things.

3. Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells.

4. Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission

5. Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas.

6. Trust Based Multi Objective-Pelican Optimization Algorithm for Mobile Ad Hoc Networks.

7. Performance analysis of secure intelligent reflecting surface assisted ground to unmanned aerial vehicle transmission.

8. A novel enhanced security architecture for sixth generation (6G) cellular networks using authentication and acknowledgement (AA) approach

9. State Estimation and Fusion for Multisensor Systems with False Data Injection Attacks and Non-Gaussian Noises

13. A Residual-Driven Secure Transmission and Detection Approach Against Stealthy Cyber-Physical Attacks for Accident Prevention.

14. TIKI-TAKA Optimized Algorithn Based on an Enhanced Security System for Teleradiology in DICOM using Two-Level DWT Watermarking.

15. Secure transmission of simultaneous wireless information and power transfer system for Internet of things

16. Secure transmission of wireless energy-carrying communication systems for the Internet of Things

17. Role-based access using partial homomorphic encryption for securing cloud data.

18. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.

19. Analyzing Beamforming for Secure Transmission of MIMO-NOMA-Based CRN using Power Allocation Based on Second-Order Perturbation

20. 3D-HEVC Deep Video Information Hiding and Secure Transmission Method

21. Secure Image Signal Transmission Scheme Using Poly-Polarization Filtering and Orthogonal Matrix.

22. Chaotic-Enabled Phase Modulation in Time-Modulated Arrays for Secure Transmission.

23. Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN.

24. Underlying Security Transmission Design for Orthogonal Time Frequency Space (OTFS) Modulation.

25. Optimal Beamforming for Secure Transmit in Practical Wireless Networks.

26. Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method

27. A Novel Optical Frequency-Hopping Scheme Using Dual Drive Mach–Zehnder Modulator

29. Multiple Security Protection Algorithm for GF-2 Images Based on Commutative Encryption and Watermarking

30. Security‐based teleradiology in DICOM used two‐level DWT based optimization watermarking.

31. Vortex Wave Directional Modulation With Time-Dependent Phase Offset FDA.

32. Latency-aware secure transmission in MEC-assisted HSR communication systems

33. LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services

34. A Lossless-Recovery Secret Distribution Scheme Based on QR Codes

35. Joint optimization of BS-VS association and power control in secure HSR communication systems

36. Securing the UAV-Aided Non-Orthogonal Downlink in the Face of Colluding Eavesdroppers.

37. Physical Layer Security in Cybertwin-Enabled Integrated Satellite-Terrestrial Vehicle Networks.

38. Distributed Antenna Array Dynamics for Secure Wireless Communication.

39. Secure Transmission in Cell-Free Massive MIMO With Low-Resolution DACs Over Rician Fading Channels.

40. Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems.

41. 无人机中基于 C-DQN 的资源分配和 轨迹优化研究.

42. Dynamic Encryption and Secure Transmission of Terminal Data Files.

44. Blockchain-Based Autonomous Peer to Peer Information Interaction System in Financial Audit

45. Secure Image Signal Transmission Scheme Using Poly-Polarization Filtering and Orthogonal Matrix

46. IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design.

47. Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method.

48. Secure Transmission of Radio Orbital Angular Momentum Beams Based on the Frequency Diverse Array

49. The role of analog signal processing in upcoming telecommunication systems: Concept, challenges, and outlook.

50. Latency-aware secure transmission in MEC-assisted HSR communication systems.

Catalog

Books, media, physical & digital resources