Journal articles on the topic 'Confidential communications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Confidential communications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chang, Chin-Chen, and Ren-Junn Hwang. "A NEW SCHEME TO PROTECT CONFIDENTIAL IMAGES." Journal of Interconnection Networks 05, no. 03 (September 2004): 221–32. http://dx.doi.org/10.1142/s0219265904001131.
Full textHoltmanns, Silke, and Marcin Toczydlowski. "Confidential mobile mail retrieval." Computer Communications 26, no. 11 (July 2003): 1219–24. http://dx.doi.org/10.1016/s0140-3664(02)00256-6.
Full textLu, Jing Shuang, Chun Mei Du, Xin Guo, and Lei Zhang. "Research on Communications Encryption Technology Based on Integration of Digital Watermarking." Applied Mechanics and Materials 443 (October 2013): 425–29. http://dx.doi.org/10.4028/www.scientific.net/amm.443.425.
Full textSarikaya, Yunus, C. Emre Koksal, and Ozgur Ercetin. "Dynamic Network Control for Confidential Multi-Hop Communications." IEEE/ACM Transactions on Networking 24, no. 2 (April 2016): 1181–95. http://dx.doi.org/10.1109/tnet.2015.2414945.
Full textGeorgiou, Chryssis, Seth Gilbert, and Dariusz R. Kowalski. "Confidential gossip." Distributed Computing 33, no. 5 (December 3, 2019): 367–92. http://dx.doi.org/10.1007/s00446-019-00367-x.
Full textPirandola, S., S. L. Braunstein, S. Lloyd, and S. Mancini. "Confidential Direct Communications: A Quantum Approach Using Continuous Variables." IEEE Journal of Selected Topics in Quantum Electronics 15, no. 6 (2009): 1570–80. http://dx.doi.org/10.1109/jstqe.2009.2021147.
Full textAbbas, Mohammed Adil, Hojin Song, and Jun-Pyo Hong. "Secure Wireless Communications in Broadcast Channels With Confidential Messages." IEEE Access 7 (2019): 170525–33. http://dx.doi.org/10.1109/access.2019.2955603.
Full textYang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries." Informatics 9, no. 3 (September 5, 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Full textLewis, David P. "Protecting your confidential information." Computer Law & Security Review 4, no. 4 (November 1988): 28–31. http://dx.doi.org/10.1016/0267-3649(88)90150-1.
Full textJuneja, Mamta. "A Covert Communication Model-Based on Image Steganography." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 19–37. http://dx.doi.org/10.4018/ijisp.2014010102.
Full textRangkuti, Ira Sarifah, and Edward Robinson Siagian. "Implementasi Penyembunyian Pesan Pada Audio Dengan Metode Bit-Plane Complexity Segmentation (BPCS)." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 285. http://dx.doi.org/10.30865/jurikom.v7i2.2088.
Full textHoschek, Miloslav. "Quantum security and 6G critical infrastructure." Serbian Journal of Engineering Management 6, no. 1 (2021): 1–8. http://dx.doi.org/10.5937/sjem2101001h.
Full textGao, Jianbang, Zhaohui Yuan, Jing Zhou, and Bin Qiu. "Artificial-Noise-Aided Energy-Efficient Secure Multibeam Wireless Communication Schemes Based on Frequency Diverse Array." Wireless Communications and Mobile Computing 2020 (June 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/4715929.
Full textZhang, Huang, Fangguo Zhang, Baodian Wei, and Yusong Du. "Implementing confidential transactions with lattice techniques." IET Information Security 14, no. 1 (January 1, 2020): 30–38. http://dx.doi.org/10.1049/iet-ifs.2018.5491.
Full textHe, Wei, Wei Hua Sun, Jun Ling Ma, and Shi Cheng Li. "A Confidential Passive UHF Reader with Cryptographic Technique." Applied Mechanics and Materials 303-306 (February 2013): 1818–21. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1818.
Full textGao, Jianbang, Zhaohui Yuan, Bin Qiu, and Jing Zhou. "Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems." Security and Communication Networks 2020 (June 24, 2020): 1–11. http://dx.doi.org/10.1155/2020/4198595.
Full textSusan Penfold, P. "Open Reporting in Child Psychiatry*." Canadian Journal of Psychiatry 32, no. 9 (December 1987): 761–63. http://dx.doi.org/10.1177/070674378703200904.
Full textAl Qahtani, Elham, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo, and Mohamed Shehab. "Managing Access to Confidential Documents: A Case Study of an Email Security Tool." Future Internet 15, no. 11 (October 28, 2023): 356. http://dx.doi.org/10.3390/fi15110356.
Full textAtes, Mikaël, and Gianluca Lax. "Attacks on Confidentiality of Communications Between Stranger Organizations." International Journal of Knowledge-Based Organizations 3, no. 2 (April 2013): 1–18. http://dx.doi.org/10.4018/ijkbo.2013040101.
Full textNovales, Ramon, and Neeraj Mittal. "Parameterized key assignment for confidential communication in wireless networks." Ad Hoc Networks 9, no. 7 (September 2011): 1186–201. http://dx.doi.org/10.1016/j.adhoc.2011.01.009.
Full textAlupotha, Jayamine, Xavier Boyen, and Matthew McKague. "LACT+: Practical Post-Quantum Scalable Confidential Transactions." Cryptography 7, no. 2 (May 8, 2023): 24. http://dx.doi.org/10.3390/cryptography7020024.
Full textZivarifard, Hassan, Matthieu R. Bloch, and Aria Nosratinia. "Two-Multicast Channel With Confidential Messages." IEEE Transactions on Information Forensics and Security 16 (2021): 2743–58. http://dx.doi.org/10.1109/tifs.2021.3055031.
Full textBin Dai, Linman Yu, and Zheng Ma. "Relay Broadcast Channel With Confidential Messages." IEEE Transactions on Information Forensics and Security 11, no. 2 (February 2016): 410–25. http://dx.doi.org/10.1109/tifs.2015.2503259.
Full textFabre, J. C., and T. Pérennou. "Processing of confidential information in distributed systems by fragmentation." Computer Communications 20, no. 3 (May 1997): 177–88. http://dx.doi.org/10.1016/s0140-3664(97)00005-4.
Full textSun, Zhuo, Hengmiao Wu, Chenglin Zhao, and Gang Yue. "End-to-End Learning of Secure Wireless Communications: Confidential Transmission and Authentication." IEEE Wireless Communications 27, no. 5 (October 2020): 88–95. http://dx.doi.org/10.1109/mwc.001.2000005.
Full textSana Ahmed Kadhim and Saad Abdual Azize abdual Rahman. "A proposed method for encrypting and sending confidential data using polynomials." Global Journal of Engineering and Technology Advances 8, no. 3 (September 30, 2021): 014–19. http://dx.doi.org/10.30574/gjeta.2021.8.3.0122.
Full textSana Ahmed Kadhim and Saad Abdual Azize abdual Rahman. "A proposed method for encrypting and sending confidential data using polynomials." Global Journal of Engineering and Technology Advances 8, no. 2 (August 30, 2021): 082–87. http://dx.doi.org/10.30574/gjeta.2021.8.2.0133.
Full textPrytys, V. I., L. А. Krymchak, and N. I. Havlovska. "Leakage of Information as a Key Problem of Information-Analytical Provision of Economic Security of Enterprise in the Context of Digitalization of the Economy." Business Inform 10, no. 513 (2020): 240–47. http://dx.doi.org/10.32983/2222-4459-2020-10-240-247.
Full textQin, Bo. "A Practical Electronic Auction with Bids Confidential." Journal of Computer Research and Development 43, no. 1 (2006): 28. http://dx.doi.org/10.1360/crad20060105.
Full textMehmoona, Jabeen, and Maple Carsten. "Enhancing Security of Text Using Affine Cipher and Image Cryptography." IPSI Transactions on Internet Research 20, no. 2 (July 1, 2024): 36–43. http://dx.doi.org/10.58245/ipsi.tir.2402.04.
Full textNeamah, Rusul Mohammed, Jinan Ali Abed, and Elaf Ali Abbood. "Hide text depending on the three channels of pixels in color images using the modified LSB algorithm." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 809. http://dx.doi.org/10.11591/ijece.v10i1.pp809-815.
Full textCheatham, David L. "Kids Say the Darnedest Things: A Call for Adoption of a Statutory Parent-Child Confidential Communications Privilege in Response to Tougher Juvenile Sentencing Guidelines." Texas Wesleyan Law Review 8, no. 2 (March 2002): 393–416. http://dx.doi.org/10.37419/twlr.v8.i2.4.
Full textMazza, Michael J. "Is the Internal Forum under Attack? The Status of the Sacramental Seal and the Internal Forum in Church and State in the USA." Jurist: Studies in Church Law and Ministry 80, no. 1 (2024): 151–96. http://dx.doi.org/10.1353/jur.2024.a929955.
Full textArularasan, A. N., E. Aarthi, S. V. Hemanth, N. Rajkumar, and T. Kalaichelvi. "Secure Digital Information Forward Using Highly Developed AES Techniques in Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (April 3, 2023): 122–28. http://dx.doi.org/10.17762/ijritcc.v11i4s.6315.
Full textLi, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities." Entropy 21, no. 5 (May 15, 2019): 497. http://dx.doi.org/10.3390/e21050497.
Full textMiladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević, and Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines." Electronics 13, no. 5 (March 5, 2024): 991. http://dx.doi.org/10.3390/electronics13050991.
Full textDivaeva, I. R., and A. V. Litvina. "Legal regulation of issues, related to confidential information." Аграрное и земельное право, no. 7 (2022): 113–15. http://dx.doi.org/10.47643/1815-1329_2022_7_113.
Full textSingh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (April 30, 2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.
Full textRai, Arun Kumar, Hari Om, Satish Chand, and Chia-Chen Lin. "High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain." Computers 12, no. 6 (June 12, 2023): 120. http://dx.doi.org/10.3390/computers12060120.
Full textAbd, Aliaa Sadoon, and Ehab Abdul Razzaq Hussein. "Design secure multi-level communication system based on duffing chaotic map and steganography." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 238. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp238-246.
Full textBowles, Michael. "Security precautions for the disposal of confidential data." Computer Law & Security Review 7, no. 2 (July 1991): 75–76. http://dx.doi.org/10.1016/0267-3649(91)90126-g.
Full textReddy, V. Lokeswara. "Improved Secure Data Transfer Using Video Steganographic Technique." International Journal of Rough Sets and Data Analysis 4, no. 3 (July 2017): 55–70. http://dx.doi.org/10.4018/ijrsda.2017070104.
Full textShobanadevi, A., G. Maragathm, Syam Machinathu Parambil Gangadharan, Mukesh Soni, Rohit Kumar, Tien Anh Tran, and Bhupesh Kumar Singh. "Internet of Things-Based Data Hiding Scheme for Wireless Communication." Wireless Communications and Mobile Computing 2022 (January 17, 2022): 1–8. http://dx.doi.org/10.1155/2022/6997190.
Full textAndrews, N. H. "Legal advice privilege: a matter of substance." Cambridge Law Journal 59, no. 1 (March 2000): 47–50. http://dx.doi.org/10.1017/s0008197300370015.
Full textTrigger, David, and Robert Blowes. "Anthropologists, Lawyers and Issues for Expert Witnesses: Native Title Claims in Australia." Practicing Anthropology 23, no. 1 (January 1, 2001): 15–20. http://dx.doi.org/10.17730/praa.23.1.787151073p934186.
Full textWyrembelski, Rafael F., Moritz Wiese, and Holger Boche. "Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages." IEEE Transactions on Information Forensics and Security 8, no. 2 (February 2013): 324–34. http://dx.doi.org/10.1109/tifs.2012.2233473.
Full textHerranz, Javier, and Jordi Nin. "Secure and efficient anonymization of distributed confidential databases." International Journal of Information Security 13, no. 6 (April 23, 2014): 497–512. http://dx.doi.org/10.1007/s10207-014-0237-x.
Full textXie, Jian, Bin Qiu, Qiuping Wang, and Jiaqing Qu. "Broadcasting Directional Modulation Based on Random Frequency Diverse Array." Wireless Communications and Mobile Computing 2019 (May 20, 2019): 1–11. http://dx.doi.org/10.1155/2019/5051490.
Full textKoryakina, Z. I., and A. A. Ignatiev. "Protection of personal data as confidential information in criminal proceedings." Аграрное и земельное право, no. 6 (2022): 125–27. http://dx.doi.org/10.47643/1815-1329_2022_6_125.
Full textZheng, Mengfan, Wen Chen, and Cong Ling. "Polar Coding for the Cognitive Interference Channel With Confidential Messages." IEEE Journal on Selected Areas in Communications 36, no. 4 (April 2018): 762–74. http://dx.doi.org/10.1109/jsac.2018.2825139.
Full text