Journal articles on the topic 'Secured transmission'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secured transmission.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
E, Kanniga. "Huffman Algorithm for Secured Data Transmission." International Journal of Psychosocial Rehabilitation 23, no. 3 (July 30, 2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Full textDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio, and Przemysław Jedlikowski. "Secured wired BPL voice transmission system." Scientific Journal of the Military University of Land Forces 198, no. 4 (December 15, 2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Full textNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, no. 5 (May 31, 2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Full textSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Full textSrinivasan, P., A. Kannagi, and P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems." Journal of Medical Imaging and Health Informatics 11, no. 11 (November 1, 2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Full textEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Full textPadmaja, P., and G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Full textKARTHIKEYAN, A., and GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER." i-manager’s Journal on Wireless Communication Networks 6, no. 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Full textpandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 03 (March 30, 2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Full textSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Full textLi, Zhongwen, Qian Li, Zhibin Xu, Hai Jiang, and Kuan Ching Li. "A secured transmission model for EPC network." International Journal of Embedded Systems 7, no. 3/4 (2015): 324. http://dx.doi.org/10.1504/ijes.2015.072375.
Full textJayashri, N., and K. Kalaiselvi. "Secured file transmission in knowledge management-cloud." International Journal of Cloud Computing 12, no. 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.130901.
Full textKalaiselvi, K., and N. Jayashri. "Secured file transmission in knowledge management-cloud." International Journal of Cloud Computing 12, no. 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.10056013.
Full textManikandan, G., and U. Sakthi. "Chinese Remainder Theorem Based Key Management for Secured Data Transmission in Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2163–71. http://dx.doi.org/10.1166/jctn.2020.8864.
Full textP. Saveetha, P. Saveetha, Y. Harold Robinson P. Saveetha, Vimal Shanmuganathan Y. Harold Robinson, Seifedine Kadry Vimal Shanmuganathan, and Yunyoung Nam Seifedine Kadry. "Hybrid Energy-based Secured Clustering technique for Wireless Sensor Networks." 網際網路技術學刊 23, no. 1 (January 2022): 021–31. http://dx.doi.org/10.53106/160792642022012301003.
Full textSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Full textSandip Shinde,. "Efficient Frontier Rules for Secure NFC Payments and Data Transmission." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 46–57. http://dx.doi.org/10.52783/jes.751.
Full textSandhyaRani, M., and T. Sivaprasad. "Implementation of Cryptographic Approach for Image Transmission with Security." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i4.7.20568.
Full textD. S. Sandhiya, M. V. Karthikeyan, and M. Shanmuga Priya. "Secured Health Monitoring System Using AES." East Asian Journal of Multidisciplinary Research 1, no. 6 (July 27, 2022): 1175–82. http://dx.doi.org/10.55927/eajmr.v1i6.577.
Full textJoshi, Jignesh, Jagdish Rathod, and Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission." Indian Journal of Science and Technology 10, no. 20 (June 29, 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i19/110311.
Full textJoshi, Jignesh, Jagdish Rathod, and Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission." Indian Journal of Science and Technology 10, no. 20 (June 29, 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i20/110311.
Full textRandy, B. Renil, M. Hariharan, and R. Arasa Kumar. "Secured Wireless Power Transmission Using Radio Frequency Signal." International Journal of Information Sciences and Techniques 4, no. 3 (May 31, 2014): 115–22. http://dx.doi.org/10.5121/ijist.2014.4315.
Full textLandu, Mahanth, and Sujatha C.N. "Secured Transmission of Text using Double Encryption Algorithms." International Journal of Engineering Trends and Technology 49, no. 5 (July 25, 2017): 310–16. http://dx.doi.org/10.14445/22315381/ijett-v49p248.
Full textAl-Haj, Ali, Gheith Abandah, and Noor Hussein. "Crypto-based algorithms for secured medical image transmission." IET Information Security 9, no. 6 (November 1, 2015): 365–73. http://dx.doi.org/10.1049/iet-ifs.2014.0245.
Full textHemalatha, K., and Dr P. Vijayakumar. "Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 360–63. http://dx.doi.org/10.37391/ijeer.100249.
Full textAgrawal,, Jay. "Web3.0 Document Security: Leveraging Blockchain Technology." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 24, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31142.
Full textGoel, Nidhi, Balasubramanian Raman, and Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems." Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Full textSrinivasan, S., and C. Chandrasekar. "Adaptive File Comparison Technique for Secured Data Transmission Environment." Research Journal of Applied Sciences, Engineering and Technology 5, no. 4 (February 1, 2013): 1183–86. http://dx.doi.org/10.19026/rjaset.5.4834.
Full textKenfack, Gutenbert, and Alain Tiedeu. "Secured Transmission of ECG Signals: Numerical and Electronic Simulations." Journal of Signal and Information Processing 04, no. 02 (2013): 158–69. http://dx.doi.org/10.4236/jsip.2013.42023.
Full textHamiche, Hamid, Karim Kemih, Sid Ali Addouche, Ahmad Taher Azar, Rafik Saddaoui, and Mourad Laghrouche. "Hardware implementation of a new chaotic secured transmission system." International Journal of Advanced Intelligence Paradigms 20, no. 1/2 (2021): 58. http://dx.doi.org/10.1504/ijaip.2021.117609.
Full textReddy, Mittapalli Indrasena, V. Uday Kumar, K. Subba Reddy, and P. Venkat Vijay Kumar. "Secured Data Transmission Using Wavelet Based Steganography And Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 2 (May 30, 2013): 311–16. http://dx.doi.org/10.24297/ijct.v6i2.3495.
Full textSelvaraj, Priya. "A Novel approach for Secured Transmission of DICOM Images." International Journal of Advanced Intelligence Paradigms 11, no. 3-4 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10009380.
Full textLaghrouche, Mourad, Rafik Saddaoui, Ahmad Taher Azar, Sid Ali Addouche, Hamid Hamiche, and Karim Kemih. "Hardware Implementation of a New Chaotic Secured transmission System." International Journal of Advanced Intelligence Paradigms 10, no. 1 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10023062.
Full textPriya, Selvaraj. "A novel approach for secured transmission of DICOM images." International Journal of Advanced Intelligence Paradigms 12, no. 1/2 (2019): 68. http://dx.doi.org/10.1504/ijaip.2019.096953.
Full textSahoo, G., and Rajesh Kumar Tiwari. "Some new methodologies for secured data coding and transmission." International Journal of Electronic Security and Digital Forensics 3, no. 2 (2010): 120. http://dx.doi.org/10.1504/ijesdf.2010.033781.
Full textIjeri, Sanmitra, Shivananda Pujeri, Shrikant B, and Usha B A. "Image Steganography using Sudoku Puzzle for Secured Data Transmission." International Journal of Computer Applications 48, no. 17 (June 30, 2012): 31–35. http://dx.doi.org/10.5120/7443-0460.
Full textMushenko, Alexey, Julia Dzuba, Alexey Nekrasov, and Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer." Electronics 9, no. 3 (March 18, 2020): 497. http://dx.doi.org/10.3390/electronics9030497.
Full textChristopher James Labrador, Gillian Claire Cancio, Krizia Dianne Congson, Kerr Jason Quevedo, Rhea Ann Verallo, and James Michael Ca˜nete. "Blood Pressure Monitoring System using Remote and Secure Data Transmission." Research Briefs on Information and Communication Technology Evolution 6 (December 15, 2020): 129–43. http://dx.doi.org/10.56801/rebicte.v6i.111.
Full textMunshi, Asmaa. "Improved MQTT Secure Transmission Flags in Smart Homes." Sensors 22, no. 6 (March 10, 2022): 2174. http://dx.doi.org/10.3390/s22062174.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textMohammed Salih, Abdulkareem. "Secured Watermarking Image Using Spread Spectrum." Tikrit Journal of Engineering Sciences 23, no. 3 (August 31, 2016): 71–78. http://dx.doi.org/10.25130/tjes.23.3.08.
Full textBalamurugan, P., M. Shyamala Devi, and V. Sharmila. "Detecting malicious nodes using data aggregation protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 594. http://dx.doi.org/10.14419/ijet.v7i1.1.10365.
Full textEt. al., J. Stalin,. "Fuzzy Logic Based Secured Routing In Vanets." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (May 10, 2021): 335–48. http://dx.doi.org/10.17762/turcomat.v12i11.5877.
Full textEt. al., Anitha S,. "Data Transmission with Improving Lifetime of Cluster Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 420–28. http://dx.doi.org/10.17762/turcomat.v12i2.827.
Full textC, Vasuki, Dr Kavitha S, and Bhuvaneswari S. "A Certain Investigation on Secured and Energy Efficient Data Transmission Techniques Over Wireless Sensor Network." Webology 18, no. 05 (October 29, 2021): 1226–35. http://dx.doi.org/10.14704/web/v18si05/web18303.
Full textF. M. Suaib Akhter, A., A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin. "A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks." Computers, Materials & Continua 68, no. 1 (2021): 229–46. http://dx.doi.org/10.32604/cmc.2021.015447.
Full textSarkar, Arindam, and J. K. Mandal. "Secured Transmission through Multi Layer Perceptron in Wireless Communication (STMLP)." International Journal of Mobile Network Communications & Telematics 4, no. 4 (August 31, 2014): 1–16. http://dx.doi.org/10.5121/ijmnct.2014.4401.
Full textXu, Min, Xiaofeng Tao, Fan Yang, and Huici Wu. "Enhancing Secured Coverage With CoMP Transmission in Heterogeneous Cellular Networks." IEEE Communications Letters 20, no. 11 (November 2016): 2272–75. http://dx.doi.org/10.1109/lcomm.2016.2598536.
Full textPavan Kumar, A., Lingam Gajjela, and N. Raghavendra Sai. "A Hybrid Hash-Stego for Secured Message Transmission Using Stegnography." IOP Conference Series: Materials Science and Engineering 981 (December 5, 2020): 022014. http://dx.doi.org/10.1088/1757-899x/981/2/022014.
Full textkumar, Shashi R., Anupama A. Deshponde, and B. Mohankumar Naik. "Two Layer data Prediction and secured data transmission in WSN." International Journal of Engineering Trends and Technology 54, no. 4 (December 25, 2017): 216–22. http://dx.doi.org/10.14445/22315381/ijett-v54p231.
Full text