Academic literature on the topic 'Secure Channel Protocol (SCP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Channel Protocol (SCP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Channel Protocol (SCP)"
WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (December 2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.
Full textRubel, Paul, Jocelyne Fayn, Peter W. Macfarlane, Danilo Pani, Alois Schlögl, and Alpo Värri. "The History and Challenges of SCP-ECG: The Standard Communication Protocol for Computer-Assisted Electrocardiography." Hearts 2, no. 3 (August 24, 2021): 384–409. http://dx.doi.org/10.3390/hearts2030031.
Full textWANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (May 2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.
Full textShen, Dongsu, Wenping Ma, Meiling Wang, and Xunru Yin. "Improvement of a controlled quantum secure direct communication protocol." Modern Physics Letters B 28, no. 15 (June 17, 2014): 1450121. http://dx.doi.org/10.1142/s0217984914501218.
Full textSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Full textHarun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (September 9, 2020): 1481. http://dx.doi.org/10.3390/sym12091481.
Full textFu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.
Full textZhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.
Full textGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Full textXIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (June 2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.
Full textDissertations / Theses on the topic "Secure Channel Protocol (SCP)"
Larsson, Fredrik. ""Halfpipe Active Channel"- developing a secure communications protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2799.
Full textWith the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network.
The purpose of this thesis is to develop a secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the final protocol. The result, the Halfpipe Active Channel protocol, is an authorized, encrypted, session oriented, message based and light weight protocol designed to minimize computational as well as network overhead.
This master's thesis project was defined by and performed at Zenterio AB during the second half of 2004.
Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Full textThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Book chapters on the topic "Secure Channel Protocol (SCP)"
Niemi, Arto, Vasile Adrian Bogdan Pop, and Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol." In Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Full textZhou, Dan, and Shiu-Kai Chin. "Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol." In FM’99 — Formal Methods, 758–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48119-2_42.
Full textAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, and Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets." In Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Full textRantos, Konstantinos, and Konstantinos Markantonakis. "An Asymmetric Cryptography Secure Channel Protocol for Smart Cards." In Security and Protection in Information Processing Systems, 351–65. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_23.
Full textJavali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.
Full textAbdullah, Hesham Mohammed Ali, and A. V. Senthil Kumar. "Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing." In Enabling Technologies and Architectures for Next-Generation Networking Capabilities, 105–24. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6023-4.ch005.
Full textChandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.
Full textThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition, 1667–75. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.
Full textThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, 71–81. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.
Full textChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense, 130–45. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.
Full textConference papers on the topic "Secure Channel Protocol (SCP)"
Alvermann, John, Michael Kurdziel, and William Furman. "The Secure Communication Interoperability Protocol (SCIP) over an HF Radio Channel." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302132.
Full textAlvermann, John M., and Michael T. Kurdziel. "The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753183.
Full textEffendi, Mufid Ridlo, Ridwan Sidik Al-Falah, Sarbini, and Nanang Ismail. "IoT-Based Battery Monitoring System in Solar Power Plants with Secure Copy Protocol (SCP)." In 2021 7th International Conference on Wireless and Telematics (ICWT). IEEE, 2021. http://dx.doi.org/10.1109/icwt52862.2021.9678210.
Full textRay, Baishakhi, and Shivakant Mishra. "A Protocol for Building Secure and Reliable Covert Channel." In 2008 Sixth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2008. http://dx.doi.org/10.1109/pst.2008.26.
Full textBerchtold, Waldemar, Patrick Lieb, and Martin Steinebach. "Secure communication protocol for a low-bandwidth audio channel." In 2017 25th European Signal Processing Conference (EUSIPCO). IEEE, 2017. http://dx.doi.org/10.23919/eusipco.2017.8081601.
Full textObinna, Omego, Eckhard Pfluegel, Charles A. Clarke, and Martin J. Tunnicliffe. "A multi-channel steganographic protocol for secure SMS mobile banking." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356393.
Full textMahmood, Baban, Ahmed Ibrahim, and D. Manivannan. "SAriadne: A secure source routing protocol to prevent hidden-channel attacks." In 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2016. http://dx.doi.org/10.1109/wimob.2016.7763267.
Full textAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, and Serge Chaumette. "An efficient, secure and trusted channel protocol for avionics wireless networks." In 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE, 2016. http://dx.doi.org/10.1109/dasc.2016.7777967.
Full textIsaka, Motohiko. "An unconditionally secure protocol based on lattices over the Gaussian channel." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895618.
Full textPoh, Geong Sen, Kok-Lim Alvin Yau, and Mee Hong Ling. "Analysis of a secure cooperative channel sensing protocol for cognitive radio networks." In the Fifth International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2388576.2388581.
Full text