Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Secured transmission“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Secured transmission" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Secured transmission"
E, Kanniga. „Huffman Algorithm for Secured Data Transmission“. International Journal of Psychosocial Rehabilitation 23, Nr. 3 (30.07.2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Der volle Inhalt der QuelleDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio und Przemysław Jedlikowski. „Secured wired BPL voice transmission system“. Scientific Journal of the Military University of Land Forces 198, Nr. 4 (15.12.2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Der volle Inhalt der QuelleNarmadha., R. P. „OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION.“ International Journal of Advanced Research 4, Nr. 5 (31.05.2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Der volle Inhalt der QuelleSultana, Jeenat, und Tasnuva Ahmed. „Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET“. International Journal of Electrical and Computer Engineering (IJECE) 8, Nr. 6 (01.12.2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Der volle Inhalt der QuelleSrinivasan, P., A. Kannagi und P. Rajendiran. „Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems“. Journal of Medical Imaging and Health Informatics 11, Nr. 11 (01.11.2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Der volle Inhalt der QuelleEt.al, G. Aparna. „A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 3 (11.04.2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Der volle Inhalt der QuellePadmaja, P., und G. V. Marutheswar. „Certain Investigation on Secured Data Transmission in Wireless Sensor Networks“. International Journal of Mobile Computing and Multimedia Communications 8, Nr. 1 (Januar 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Der volle Inhalt der QuelleKARTHIKEYAN, A., und GOKUL S. SAI. „SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER“. i-manager’s Journal on Wireless Communication Networks 6, Nr. 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Der volle Inhalt der Quellepandey, K. S. Abitha, Anjali. „Secured Data Transmission Using Elliptic Curve Cryptography“. International Journal of Innovative Research in Computer and Communication Engineering 03, Nr. 03 (30.03.2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Der volle Inhalt der QuelleSundarraj, P. Daniel. „SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS“. International Journal of Advanced Research in Computer Science 8, Nr. 9 (30.09.2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Der volle Inhalt der QuelleDissertationen zum Thema "Secured transmission"
Mal, Satadal. „Development of Microprocessor Based Encoders for Secured Transmission“. Thesis, University of North Bengal, 2003. http://hdl.handle.net/123456789/25.
Der volle Inhalt der QuelleSinha, Sharad. „An Approach towards Design and Implementation of Microprocessor-Based Cryptosystems for Secured Transmission“. Thesis, University of North Bengal, 2007. http://hdl.handle.net/123456789/12.
Der volle Inhalt der QuelleLOMBARDI, FLAVIO. „Reliable Secure Multicast Data Transmission and Applications“. Doctoral thesis, La Sapienza, 2005. http://hdl.handle.net/11573/917049.
Der volle Inhalt der QuelleYang, Q. „Secure message transmission in the general adversary model“. Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Der volle Inhalt der QuelleRahbari, Hanif. „Obfuscation of Transmission Fingerprints for Secure Wireless Communications“. Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612371.
Der volle Inhalt der QuelleUrsini, Leonora. „Optical Chaotic Transmission Systems For Secure Data Communication“. Doctoral thesis, Università degli studi di Padova, 2009. http://hdl.handle.net/11577/3425929.
Der volle Inhalt der QuelleL'attività di Ricerca, presentata in questa Tesi, è stata parte del Progetto di Rilevante Interesse Nazionale (PRIN), finanziato dal Ministero dell'Università e della Ricerca, e intitolato ``Trasmissione in fibra ottica su portante ottica caotica'' (PRIN200509125), svolto in collaborazione fra le Università di Padova, Pavia e l'Aquila. La protezione nel trasferimento delle informazioni è, da sempre, una delle caratterisctiche più richieste ai mezzi di comunicazione. I metodi sia crittografici che steganografici, atti a garantire sicurezza agli utenti che scambiano in rete dati sensibili, costituiscono un grosso filone di ricerca. Lo scopo di questa Tesi è dimostrare la comunicazione di un messaggio su un canale in fibra ottica, utilizzando una tecnica che si basa sul principio di sincronizzazione di una coppia di laser, operanti nel regime caotico. Il caos deterministico è un regime di alcuni sistemi dinamici non-lineari, che si caratterizza con evoluzioni irregolari, fortemente dipendenti dalle condizioni iniziali. Il regime caotico, nei laser, si manifesta con rapide ed apparentemente casuali oscillazioni della forma d'onda emessa. Nello schema di trasmissione, il trasmettitore è costituito da un generatore di messaggi e da un laser caotico, detto master, che funge da portante ottica; il messaggio d'informazione da trasmettere è opportunamente sovrapposto all'emissione del master, realizzando uno schema di protezione di tipo steganografico. Al ricevitore, l'estrazione del messaggio si basa sulla disponibilità di un altro laser, detto slave, che generi un'identica forma d'onda caotica (sincronizzazione), da sottrarre al segnale trasmesso. Perchè ciò sia possibile, data la forte dipendenza del caos dalle condizioni iniziali e dai valori dei parametri dei laser, è necessario disporre di una coppia di laser avente parametri molto simili. Questo fatto, aggiunto ad una efficiente mascheratura del messaggio, rende molto difficile la decodifica da parte di un ascoltatore non autorizzato. L'efficacia di tale tecnica si basa sulla qualità della sincronizzazione, che può degradarsi, oltre che per una scelta non corretta dei due laser, anche per gli effetti distorsivi della fibra ottica su cui si trasmette il segnale, come attenuazione, dispersione cromatica, effetti nonlineari e di polarizzazione, e dal rumore. In questa Tesi, si è studiato, da un punto di vista teorico e numerico il sistema caotico su fibra ottica, analizzandone le prestazioni per varie configurazioni. Lo studio ha riguardato: la generazione del caos di un laser a semiconduttore, mediante retroriflessione del segnale con uno specchio esterno; l'analisi della sincronizzazione con un laser gemello; la modellizzazione del canale ottico; l'analisi delle prestazioni del sistema caotico per la steganografia di messaggi digitali. Nella Tesi, sono anche presentati metodi originali per migliorare le prestazioni di sicurezza e recupero del messaggio. Infine, è stato implementato anche un dimostratore del sistema, in collaborazione con l'Università di Pavia.
Chaparala, Suman Krishna. „Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell“. University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Der volle Inhalt der QuellePfennig, Stefan, und Elke Franz. „Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency“. Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Der volle Inhalt der QuellePfennig, Stefan, und Elke Franz. „Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency“. Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Der volle Inhalt der QuelleZhang, Xin. „Secure Data Management and Transmission Infrastructure for the Future Smart Grid“. Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/14657.
Der volle Inhalt der QuelleBücher zum Thema "Secured transmission"
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Den vollen Inhalt der Quelle findenKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Den vollen Inhalt der Quelle findenShankar, K., und Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Der volle Inhalt der QuelleWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Den vollen Inhalt der Quelle findenWade, Edwards, Hrsg. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Den vollen Inhalt der Quelle findenK, Kokula Krishna Hari, Hrsg. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Den vollen Inhalt der Quelle finden1967-, Barthe Gilles, Hrsg. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Den vollen Inhalt der Quelle finden1967-, Barthe Gilles, Hrsg. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Den vollen Inhalt der Quelle findenCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Den vollen Inhalt der Quelle findenShankar, K., und Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Secured transmission"
Baliś, Bartosz, Marian Bubak, Wojciech Rza̧sa und Tomasz Szepieniec. „Efficiency of the GSI Secured Network Transmission“. In Computational Science - ICCS 2004, 107–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24685-5_14.
Der volle Inhalt der QuelleJuneja, Mamta, und Parvinder Singh Sandhu. „Image Segmentaion and Steganography for Secured Information Transmission“. In Communications in Computer and Information Science, 617–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_114.
Der volle Inhalt der QuelleSadegh Amiri, Iraj, Sayed Ehsan Alavi und Sevia Mahdaliza Idrus. „Results of Digital Soliton Pulse Generation and Transmission Using Microring Resonators“. In Soliton Coding for Secured Optical Communication Link, 41–56. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-161-9_3.
Der volle Inhalt der QuelleAdi Narayana Reddy, K., V. Madhu Viswanatham und B. Vishnu Vardhan. „An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission“. In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Der volle Inhalt der QuellePrabhu, Pavithra, und K. N. Manjunath. „Secured Image Transmission in Medical Imaging Applications—A Survey“. In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 125–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_12.
Der volle Inhalt der QuelleRath, Arabinda, S. Q. Baig, Bisakha Biswal und Gayatri Devi. „Secured Data Transmission in Low Power WSN with LoRA“. In Lecture Notes in Networks and Systems, 417–24. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9967-2_39.
Der volle Inhalt der QuelleSamoud, A., und A. Cherif. „Implementation of a cryptography algorithm for secured image transmission“. In Innovative and Intelligent Technology-Based Services for Smart Environments – Smart Sensing and Artificial Intelligence, 229–34. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003181545-33.
Der volle Inhalt der QuelleThirumarai Selvi, C., R. S. Sankarasubramanian und M. MuthuKrishnan. „Encryption and Decryption of Image for Secured Data Transmission“. In Futuristic Communication and Network Technologies, 145–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4625-6_15.
Der volle Inhalt der QuelleRavi, Kalkundri, Rajashri Khanai und Kalkundri Praveen. „Analysis of Cryptographic Algorithms for Secured Data Transmission in VANETs“. In Lecture Notes in Electrical Engineering, 433–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0626-0_34.
Der volle Inhalt der QuellePrabhu, Pavithra, und K. N. Manjunath. „Secured Transmission of Medical Images in Radiology Using AES Technique“. In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 103–12. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_10.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Secured transmission"
Gudda, Jagadevi C., Vijayrani Katkam, Nisha SL, K. Aruna Bhaskar und Naveen I. G. „Secured Data Transmission in Multiplexing System“. In 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2023. http://dx.doi.org/10.1109/icicacs57338.2023.10099954.
Der volle Inhalt der QuelleJebarani, M. R. Ebenezar, P. Kavipriya, S. Lakshmi und T. Vino. „Secured SMS Transmission using Android App“. In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395777.
Der volle Inhalt der QuellePal, Dipankar, und Nabin Ghoshal. „Secured data transmission through audio signal (SDTAS)“. In 2014 9th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2014. http://dx.doi.org/10.1109/iciinfs.2014.7036649.
Der volle Inhalt der QuelleAnand, R., Abhishek Krishna V P, Dhanesh U M und Gowtham Vas. „Secured agriculture crop monitoring using Blockchain“. In 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2022. http://dx.doi.org/10.1109/icpects56089.2022.10047749.
Der volle Inhalt der QuelleLeang, Bunrong, Rock-Won Kim und Kwan-Hee Yoo. „Real-Time Transmission of Secured PLCs Sensing Data“. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00177.
Der volle Inhalt der QuelleSupriadi, Agusma Wajiansyah, Hari purwadi, Rheo Malani, Arda Yunianta und Adi Pratomo. „Secured Data Transmission using Metadata Logger Manipulation Approach“. In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878601.
Der volle Inhalt der QuelleGulappagol, Laxmi, und K. B. ShivaKumar. „Secured data transmission using knight and LSB technique“. In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). IEEE, 2017. http://dx.doi.org/10.1109/iceeccot.2017.8284678.
Der volle Inhalt der QuelleCutuli, Giovanni. „Realising secured data transmission in KNX salvatore cavalieri“. In 2009 7th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2009. http://dx.doi.org/10.1109/indin.2009.5195875.
Der volle Inhalt der QuelleBhowal, Krishna, D. Sarkar, S. Biswas und P. P. Sarkar. „Secured image transmission with GA based Audio Steganography“. In 2011 Annual IEEE India Conference (INDICON). IEEE, 2011. http://dx.doi.org/10.1109/indcon.2011.6139438.
Der volle Inhalt der QuelleJagadish, Kori Madhura, und Nagamani K. „Secured Information Transmission Using Audio and Video Steganography“. In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2023. http://dx.doi.org/10.1109/csitss60515.2023.10334224.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Secured transmission"
Han, I., S. Bond, R. Welty, Y. Du, S. Yoo, C. Reinhardt, E. Behymer, V. Sperry und N. Kobayashi. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission. Office of Scientific and Technical Information (OSTI), Februar 2004. http://dx.doi.org/10.2172/15013953.
Der volle Inhalt der QuellePopkov, G. V. A model for the breakdown of the operation of a secure data transmission network under conditions of external destructive influences. Ailamazyan Program Systems Institute of Russian Academy of Sciences, März 2024. http://dx.doi.org/10.12731/ofernio.2024.25292.
Der volle Inhalt der Quelle