Academic literature on the topic 'END TO END SECURED'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'END TO END SECURED.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "END TO END SECURED"

1

Goel, Nidhi, Balasubramanian Raman, and Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems." Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.

Full text
Abstract:
Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed encryption technique maintains the compression efficiency of underlying entropy coder, a
APA, Harvard, Vancouver, ISO, and other styles
2

Logunleko, Abolore Muhamin, Kolawole Bariu Logunleko, and Olanrewaju Olaide Lawal. "An End-to-End Secured Email System using Base64 Algorithm." International Journal of Computer Applications 175, no. 28 (2020): 1–6. http://dx.doi.org/10.5120/ijca2020920669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chalouf, M. A., and F. Krief. "A secured, automated, and dynamic end-to-end service level negotiation." Concurrency and Computation: Practice and Experience 25, no. 2 (2012): 180–202. http://dx.doi.org/10.1002/cpe.2806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mathur, Avijit, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly, and Daniel Toal. "A secure end-to-end IoT solution." Sensors and Actuators A: Physical 263 (August 2017): 291–99. http://dx.doi.org/10.1016/j.sna.2017.06.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swati Salunkhe et al. "Advanced End-to-End Image Encryption and Compression." Proceeding International Conference on Science and Engineering 11, no. 1 (2023): 282–90. http://dx.doi.org/10.52783/cienceng.v11i1.125.

Full text
Abstract:
Encryption-then-Compression (EtC) systems are used to securely transmit images over an untrusted channel provider, and a novel grayscale-based block scrambling image encryption method is developed to improve the security of EtC systems. This approach is intended to make encryption-then-compression (EtC) systems more secure. In comparison to the new encryption technology, the suggested scheme allows for smaller block sizes and a greater number of blocks.Despite the fact that the original image has three colour channels, photos encrypted using the suggested method contain less colour information
APA, Harvard, Vancouver, ISO, and other styles
6

Guilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Mathieu. "Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors." IEEE Design & Test of Computers 24, no. 6 (2007): 546–55. http://dx.doi.org/10.1109/mdt.2007.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, and Yves Matheiu. "Secured CAD back-end flow for power-analysis resistant cryptoprocessors." IEEE Design & Test of Computers 24, no. 99 (2007): x2. http://dx.doi.org/10.1109/mdt.2007.4343579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hardjono, Thomas, and Tadashi Ohta. "Secure end-to-end delegations in distributed systems." Computer Communications 17, no. 3 (1994): 230–38. http://dx.doi.org/10.1016/0140-3664(94)90008-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pramukantoro, Eko Sakti, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, and Deny Hari Prasetya Dewa. "Implementasi Mekanisme End-To-End Security pada IoT Middleware." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (2019): 335. http://dx.doi.org/10.25126/jtiik.2019631401.

Full text
Abstract:
<p class="Abstrak">Pada penelitian sebelumnya telah dikembangkan sebuah <em>middleware</em> dengan pendekatan <em>event-driven</em> yang mampu mendukung interoperabilitas berbagai macam perangkat sensor pada lingkungan IoT. Namun, skema komunikasi pada <em>middleware</em> tersebut masih terdapat celah keamanan dan menimbulkan ancaman berupa <em>eavasdropping</em>. Solusi dari permasalahan ini adalah menerapakan mekanisme <em>end-to-end security</em>. Dalam penelitian ini dilakukan penerapan algoritme kriptografi AES-CBC 128 pada
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmad, Mudassar, Majid Hussain, Beenish Abbas, et al. "End-to-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises." IEEE Access 6 (2018): 11641–56. http://dx.doi.org/10.1109/access.2018.2802841.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "END TO END SECURED"

1

Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.

Full text
Abstract:
2009 - 2010<br>Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de
APA, Harvard, Vancouver, ISO, and other styles
2

Tahir, Ruhma. "An ICMetric based framework for secure end-to-end communication." Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22281/.

Full text
Abstract:
Conventional cryptographic algorithms rely on highly sophisticated and well established algorithms to ensure security, while the cryptographic keys are kept secret. However, adversaries can attack the keys of a cryptosystem without targeting the algorithm. This dissertation aims to cover this gap in the domain of cryptography, that is, the problem associated with cryptographic key compromise. The thesis accomplishes this by presenting a novel security framework based on the ICMetric technology. The proposed framework provides schemes for a secure end-to-end communication environment based on t
APA, Harvard, Vancouver, ISO, and other styles
3

Vogt, Christian. "Efficient and Secure End-to-End Mobility Support in IPv6." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.

Full text
Abstract:
Over the last years, security-kernels have played a promising role in reshaping the landscape of platform security on embedded devices. Security-kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms on a small TCB, which enforces isolation between components. The reduced TCB  minimizes the system attack surface and facilitates the use of formal methods to ensure the kernel functional correctness and security. In this thesis, we explore various aspects of building a provably secure separation kernel using virtualization technology. We show
APA, Harvard, Vancouver, ISO, and other styles
5

Schmidt, Dawin. "A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196360.

Full text
Abstract:
End-to-end encryption is becoming a standard feature in popular mobile chat appli-cations (apps) with millions of users. In the two years a number of leading chat apps have added end-end encryption features including LINE, KakaoTalk, Viber, Facebook Messenger, and WhatsApp.However, most of these apps are closed-source and there is little to no independent ver-ification of their end-to-end encryption system design. These implementations may be a major concern as proprietary chat apps may make use of non-standard cryptographic algorithms that may not follow cryptography and security best practice
APA, Harvard, Vancouver, ISO, and other styles
6

Vogt, Christian [Verfasser]. "Efficient and Secure End-to-End Mobility Support in IPv6 / Christian Vogt." Aachen : Shaker, 2007. http://d-nb.info/1164340271/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Unurkhaan, Esbold. "Secure end-to-end transport over SCTP a new security extension for SCTP /." [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=975686569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kühner, Holger [Verfasser], and H. [Akademischer Betreuer] Hartenstein. "Performance of End-to-End Secure Data Sharing / Holger Kühner ; Betreuer: H. Hartenstein." Karlsruhe : KIT-Bibliothek, 2017. http://d-nb.info/1132997763/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Siu Ping. "End-to-end streaming protocols with QoS control for secure IP multimedia communications /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHAN.

Full text
Abstract:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 167-175). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
10

Seggelmann, Robin [Verfasser], Erwin P. [Akademischer Betreuer] Rathgeb, and Bruno [Akademischer Betreuer] Müller-Clostermann. "SCTP : Strategies to Secure End-To-End Communication / Robin Seggelmann. Gutachter: Bruno Müller-Clostermann. Betreuer: Erwin P. Rathgeb." Duisburg, 2013. http://d-nb.info/1030475571/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "END TO END SECURED"

1

Delusions of intelligence: Enigma, Ultra and the end of secure ciphers. Cambridge University Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keith, Hollihan, ed. The end of energy obesity: Breaking today's energy addiction for a prosperous and secure tomorrow. John Wiley & Sons, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Money for life: The "money makeover" that will end your worries and secure your dreams. Simon & Schuster, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

End to end. Dales Large Print Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bergsmann, Stefan. End-to-End-Geschäftsprozessmanagement. Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0840-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Diane, McMichael Gilster, ed. Bluetooth end to end. M&T Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trust, Leeds Civic, ed. Bridge End - dead end?. Leeds Civic Trust, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bill, Mann, ed. Wireless devices end to end. Hungry Minds, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1952-, Tabernero Antonio, ed. Madrid: From end to end. Ediciones Aldeasa, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

End-to-end DSL architectures. Cisco Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "END TO END SECURED"

1

Guo, Dapeng, Melody Moh, and Teng-Sheng Moh. "End-to-End Learning for Autonomous Driving in Secured Smart Cities." In Data-Driven Mining, Learning and Analytics for Secured Smart Cities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72139-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bitzer, Wolfgang. "Geräte für die End-zu-Ende-Verschlüsselung." In Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/978-3-642-85103-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hohendorf, Carsten, Erwin P. Rathgeb, Esbold Unurkhaan, and Michael Tüxen. "Secure End-to-End Transport over SCTP." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11766155_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Canetti, Ran, Palak Jain, Marika Swanberg, and Mayank Varia. "Universally Composable End-to-End Secure Messaging." In Advances in Cryptology – CRYPTO 2022. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15979-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sousa, Patrícia R., João S. Resende, Rolando Martins, and Luís Antunes. "Secure Provisioning for Achieving End-to-End Secure Communications." In Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Basudeo, and K. S. Jasmine. "Secure End-To-End Authentication for Mobile Banking." In Software Engineering in Intelligent Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18473-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Castiglione, A., G. Cattaneo, A. De Santis, F. Petagna, and U. Ferraro Petrillo. "SPEECH: Secure Personal End-to-End Communication with Handheld." In ISSE 2006 — Securing Electronic Busines Processes. Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Etemad, Mohammad, and Alptekin Küpçü. "Efficient Key Authentication Service for Secure End-to-End Communications." In Provable Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Varadharajan, V., and Y. Mu. "Design of Secure End-to-End Protocols for Mobile Systems." In Mobile Communications. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34980-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Akram, Raja Naeem, and Ryan K. L. Ko. "End-to-End Secure and Privacy Preserving Mobile Chat Application." In Information Security Theory and Practice. Securing the Internet of Things. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43826-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "END TO END SECURED"

1

Awad, Mohammed, and Ernst L. Leiss. "End-to-End cryptographic voting: Potentials and limitations." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patgiri, Ripon, and Naresh Babu Muppalaneni. "Stealth: A Highly Secured End-to-End Symmetric Communication Protocol." In 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2022. http://dx.doi.org/10.1109/isncc55209.2022.9851810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schillinger, Fabian, and Christian Schindelhauer. "Partitioned Private User Storages in End-to-End Encrypted Online Social Networks." In 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2020. http://dx.doi.org/10.23919/icitst51030.2020.9351335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Legrand, W. "Interoperability issues for end to end security: the IP Federating Network (IPFN) for digital secured mobile networks." In IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IEE, 2003. http://dx.doi.org/10.1049/ic:20030025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Winderickx, Jori, Dave Singelee, and Nele Mentens. "HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing." In 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2018. http://dx.doi.org/10.1109/ccnc.2018.8319245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhashini, K. Priya, K. Nalini, and Ponnam Lalitha. "An End-to-End secured Blockchain framework for Internet of Things based smart Healthcare." In 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2023. http://dx.doi.org/10.1109/icecct56650.2023.10179650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salant, Eliot, and Gidon Gershinsky. "End-to-end secure insurance telematics." In SYSTOR '19: The 12th ACM International Systems and Storage Conference. ACM, 2019. http://dx.doi.org/10.1145/3319647.3326466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chowdhury, Fahim Shahriar, Asif Istiaque, Adil Mahmud, and Mohammad Miskat. "An implementation of a lightweight end-to-end secured communication system for patient monitoring system." In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). IEEE, 2018. http://dx.doi.org/10.1109/edct.2018.8405076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Qingcheng, Xiaosong Yu, Zihao Wang, Yongli Zhao, and Jie Zhang. "Demonstration of Autonomic End-to-End QoS Assurance over SDN-based QKD-Secured Optical Networks." In 2023 Opto-Electronics and Communications Conference (OECC). IEEE, 2023. http://dx.doi.org/10.1109/oecc56963.2023.10209908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, T. N. T., P. Shum, and E. H. Chua. "Secure end-to-end mobile payment system." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207231.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "END TO END SECURED"

1

Chari, Suresh. MONTAGE: A Methodology for Designing Composable End-to-End Secure Distributed Systems. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada563359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunt, Will, and Remco Zwetsloot. The Chipmakers: U.S. Strengths and Priorities for the High-End Semiconductor Workforce. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20190035.

Full text
Abstract:
Technical leadership in the semiconductor industry has been a cornerstone of U.S. military and economic power for decades, but continued competitiveness is not guaranteed. This issue brief exploring the composition of the workforce bolstering U.S. leadership in the semiconductor industry concludes that immigration restrictions are directly at odds with U.S. efforts to secure its supply chains.
APA, Harvard, Vancouver, ISO, and other styles
3

Marshak, Ronni. End-to-End Customer Experience. Patricia Seybold Group, 2011. http://dx.doi.org/10.1571/psgp02-10-11cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Best, Jeremy. End to End Weapons Engineering. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1711352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Malis, A. G. PSN End-to-End functional specification. RFC Editor, 1986. http://dx.doi.org/10.17487/rfc0979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mathews, A., T. Kwan, K. Buescher, C. Snell, and K. Adams. End-to-End Radiographic Systems Simulation. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/759186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Montenegro, G., and M. Borella. RSIP Support for End-to-end IPsec. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Miller, Jonah. End-to-End Modeling of a Kilonova. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1818091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dawkins, S., G. Montenegro, M. Kojo, and V. Magret. End-to-end Performance Implications of Slow Links. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malas, D., and A. Morton. Basic Telephony SIP End-to-End Performance Metrics. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!