Academic literature on the topic 'Secured transmission'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secured transmission.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secured transmission"
E, Kanniga. "Huffman Algorithm for Secured Data Transmission." International Journal of Psychosocial Rehabilitation 23, no. 3 (July 30, 2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Full textDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio, and Przemysław Jedlikowski. "Secured wired BPL voice transmission system." Scientific Journal of the Military University of Land Forces 198, no. 4 (December 15, 2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Full textNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, no. 5 (May 31, 2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Full textSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Full textSrinivasan, P., A. Kannagi, and P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems." Journal of Medical Imaging and Health Informatics 11, no. 11 (November 1, 2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Full textEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Full textPadmaja, P., and G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Full textKARTHIKEYAN, A., and GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER." i-manager’s Journal on Wireless Communication Networks 6, no. 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Full textpandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 03 (March 30, 2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Full textSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Full textDissertations / Theses on the topic "Secured transmission"
Mal, Satadal. "Development of Microprocessor Based Encoders for Secured Transmission." Thesis, University of North Bengal, 2003. http://hdl.handle.net/123456789/25.
Full textSinha, Sharad. "An Approach towards Design and Implementation of Microprocessor-Based Cryptosystems for Secured Transmission." Thesis, University of North Bengal, 2007. http://hdl.handle.net/123456789/12.
Full textLOMBARDI, FLAVIO. "Reliable Secure Multicast Data Transmission and Applications." Doctoral thesis, La Sapienza, 2005. http://hdl.handle.net/11573/917049.
Full textYang, Q. "Secure message transmission in the general adversary model." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Full textRahbari, Hanif. "Obfuscation of Transmission Fingerprints for Secure Wireless Communications." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612371.
Full textUrsini, Leonora. "Optical Chaotic Transmission Systems For Secure Data Communication." Doctoral thesis, Università degli studi di Padova, 2009. http://hdl.handle.net/11577/3425929.
Full textL'attività di Ricerca, presentata in questa Tesi, è stata parte del Progetto di Rilevante Interesse Nazionale (PRIN), finanziato dal Ministero dell'Università e della Ricerca, e intitolato ``Trasmissione in fibra ottica su portante ottica caotica'' (PRIN200509125), svolto in collaborazione fra le Università di Padova, Pavia e l'Aquila. La protezione nel trasferimento delle informazioni è, da sempre, una delle caratterisctiche più richieste ai mezzi di comunicazione. I metodi sia crittografici che steganografici, atti a garantire sicurezza agli utenti che scambiano in rete dati sensibili, costituiscono un grosso filone di ricerca. Lo scopo di questa Tesi è dimostrare la comunicazione di un messaggio su un canale in fibra ottica, utilizzando una tecnica che si basa sul principio di sincronizzazione di una coppia di laser, operanti nel regime caotico. Il caos deterministico è un regime di alcuni sistemi dinamici non-lineari, che si caratterizza con evoluzioni irregolari, fortemente dipendenti dalle condizioni iniziali. Il regime caotico, nei laser, si manifesta con rapide ed apparentemente casuali oscillazioni della forma d'onda emessa. Nello schema di trasmissione, il trasmettitore è costituito da un generatore di messaggi e da un laser caotico, detto master, che funge da portante ottica; il messaggio d'informazione da trasmettere è opportunamente sovrapposto all'emissione del master, realizzando uno schema di protezione di tipo steganografico. Al ricevitore, l'estrazione del messaggio si basa sulla disponibilità di un altro laser, detto slave, che generi un'identica forma d'onda caotica (sincronizzazione), da sottrarre al segnale trasmesso. Perchè ciò sia possibile, data la forte dipendenza del caos dalle condizioni iniziali e dai valori dei parametri dei laser, è necessario disporre di una coppia di laser avente parametri molto simili. Questo fatto, aggiunto ad una efficiente mascheratura del messaggio, rende molto difficile la decodifica da parte di un ascoltatore non autorizzato. L'efficacia di tale tecnica si basa sulla qualità della sincronizzazione, che può degradarsi, oltre che per una scelta non corretta dei due laser, anche per gli effetti distorsivi della fibra ottica su cui si trasmette il segnale, come attenuazione, dispersione cromatica, effetti nonlineari e di polarizzazione, e dal rumore. In questa Tesi, si è studiato, da un punto di vista teorico e numerico il sistema caotico su fibra ottica, analizzandone le prestazioni per varie configurazioni. Lo studio ha riguardato: la generazione del caos di un laser a semiconduttore, mediante retroriflessione del segnale con uno specchio esterno; l'analisi della sincronizzazione con un laser gemello; la modellizzazione del canale ottico; l'analisi delle prestazioni del sistema caotico per la steganografia di messaggi digitali. Nella Tesi, sono anche presentati metodi originali per migliorare le prestazioni di sicurezza e recupero del messaggio. Infine, è stato implementato anche un dimostratore del sistema, in collaborazione con l'Università di Pavia.
Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Full textZhang, Xin. "Secure Data Management and Transmission Infrastructure for the Future Smart Grid." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/14657.
Full textBooks on the topic "Secured transmission"
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Find full textKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Find full textShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Full textWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Find full textWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Find full textK, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Find full text1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Find full text1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Find full textCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Find full textShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Find full textBook chapters on the topic "Secured transmission"
Baliś, Bartosz, Marian Bubak, Wojciech Rza̧sa, and Tomasz Szepieniec. "Efficiency of the GSI Secured Network Transmission." In Computational Science - ICCS 2004, 107–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24685-5_14.
Full textJuneja, Mamta, and Parvinder Singh Sandhu. "Image Segmentaion and Steganography for Secured Information Transmission." In Communications in Computer and Information Science, 617–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_114.
Full textSadegh Amiri, Iraj, Sayed Ehsan Alavi, and Sevia Mahdaliza Idrus. "Results of Digital Soliton Pulse Generation and Transmission Using Microring Resonators." In Soliton Coding for Secured Optical Communication Link, 41–56. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-161-9_3.
Full textAdi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Full textPrabhu, Pavithra, and K. N. Manjunath. "Secured Image Transmission in Medical Imaging Applications—A Survey." In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 125–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_12.
Full textRath, Arabinda, S. Q. Baig, Bisakha Biswal, and Gayatri Devi. "Secured Data Transmission in Low Power WSN with LoRA." In Lecture Notes in Networks and Systems, 417–24. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9967-2_39.
Full textSamoud, A., and A. Cherif. "Implementation of a cryptography algorithm for secured image transmission." In Innovative and Intelligent Technology-Based Services for Smart Environments – Smart Sensing and Artificial Intelligence, 229–34. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003181545-33.
Full textThirumarai Selvi, C., R. S. Sankarasubramanian, and M. MuthuKrishnan. "Encryption and Decryption of Image for Secured Data Transmission." In Futuristic Communication and Network Technologies, 145–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4625-6_15.
Full textRavi, Kalkundri, Rajashri Khanai, and Kalkundri Praveen. "Analysis of Cryptographic Algorithms for Secured Data Transmission in VANETs." In Lecture Notes in Electrical Engineering, 433–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0626-0_34.
Full textPrabhu, Pavithra, and K. N. Manjunath. "Secured Transmission of Medical Images in Radiology Using AES Technique." In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 103–12. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_10.
Full textConference papers on the topic "Secured transmission"
Gudda, Jagadevi C., Vijayrani Katkam, Nisha SL, K. Aruna Bhaskar, and Naveen I. G. "Secured Data Transmission in Multiplexing System." In 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2023. http://dx.doi.org/10.1109/icicacs57338.2023.10099954.
Full textJebarani, M. R. Ebenezar, P. Kavipriya, S. Lakshmi, and T. Vino. "Secured SMS Transmission using Android App." In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395777.
Full textPal, Dipankar, and Nabin Ghoshal. "Secured data transmission through audio signal (SDTAS)." In 2014 9th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2014. http://dx.doi.org/10.1109/iciinfs.2014.7036649.
Full textAnand, R., Abhishek Krishna V P, Dhanesh U M, and Gowtham Vas. "Secured agriculture crop monitoring using Blockchain." In 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2022. http://dx.doi.org/10.1109/icpects56089.2022.10047749.
Full textLeang, Bunrong, Rock-Won Kim, and Kwan-Hee Yoo. "Real-Time Transmission of Secured PLCs Sensing Data." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00177.
Full textSupriadi, Agusma Wajiansyah, Hari purwadi, Rheo Malani, Arda Yunianta, and Adi Pratomo. "Secured Data Transmission using Metadata Logger Manipulation Approach." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878601.
Full textGulappagol, Laxmi, and K. B. ShivaKumar. "Secured data transmission using knight and LSB technique." In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). IEEE, 2017. http://dx.doi.org/10.1109/iceeccot.2017.8284678.
Full textCutuli, Giovanni. "Realising secured data transmission in KNX salvatore cavalieri." In 2009 7th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2009. http://dx.doi.org/10.1109/indin.2009.5195875.
Full textBhowal, Krishna, D. Sarkar, S. Biswas, and P. P. Sarkar. "Secured image transmission with GA based Audio Steganography." In 2011 Annual IEEE India Conference (INDICON). IEEE, 2011. http://dx.doi.org/10.1109/indcon.2011.6139438.
Full textJagadish, Kori Madhura, and Nagamani K. "Secured Information Transmission Using Audio and Video Steganography." In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2023. http://dx.doi.org/10.1109/csitss60515.2023.10334224.
Full textReports on the topic "Secured transmission"
Han, I., S. Bond, R. Welty, Y. Du, S. Yoo, C. Reinhardt, E. Behymer, V. Sperry, and N. Kobayashi. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission. Office of Scientific and Technical Information (OSTI), February 2004. http://dx.doi.org/10.2172/15013953.
Full textPopkov, G. V. A model for the breakdown of the operation of a secure data transmission network under conditions of external destructive influences. Ailamazyan Program Systems Institute of Russian Academy of Sciences, March 2024. http://dx.doi.org/10.12731/ofernio.2024.25292.
Full text