Artículos de revistas sobre el tema "Secured transmission"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secured transmission".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
E, Kanniga. "Huffman Algorithm for Secured Data Transmission". International Journal of Psychosocial Rehabilitation 23, n.º 3 (30 de julio de 2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Texto completoDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio y Przemysław Jedlikowski. "Secured wired BPL voice transmission system". Scientific Journal of the Military University of Land Forces 198, n.º 4 (15 de diciembre de 2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Texto completoNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, n.º 5 (31 de mayo de 2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Texto completoSultana, Jeenat y Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 6 (1 de diciembre de 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Texto completoSrinivasan, P., A. Kannagi y P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems". Journal of Medical Imaging and Health Informatics 11, n.º 11 (1 de noviembre de 2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Texto completoEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 3 (11 de abril de 2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Texto completoPadmaja, P. y G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks". International Journal of Mobile Computing and Multimedia Communications 8, n.º 1 (enero de 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Texto completoKARTHIKEYAN, A. y GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER". i-manager’s Journal on Wireless Communication Networks 6, n.º 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Texto completopandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography". International Journal of Innovative Research in Computer and Communication Engineering 03, n.º 03 (30 de marzo de 2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Texto completoSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS". International Journal of Advanced Research in Computer Science 8, n.º 9 (30 de septiembre de 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Texto completoLi, Zhongwen, Qian Li, Zhibin Xu, Hai Jiang y Kuan Ching Li. "A secured transmission model for EPC network". International Journal of Embedded Systems 7, n.º 3/4 (2015): 324. http://dx.doi.org/10.1504/ijes.2015.072375.
Texto completoJayashri, N. y K. Kalaiselvi. "Secured file transmission in knowledge management-cloud". International Journal of Cloud Computing 12, n.º 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.130901.
Texto completoKalaiselvi, K. y N. Jayashri. "Secured file transmission in knowledge management-cloud". International Journal of Cloud Computing 12, n.º 2/3/4 (2023): 246. http://dx.doi.org/10.1504/ijcc.2023.10056013.
Texto completoManikandan, G. y U. Sakthi. "Chinese Remainder Theorem Based Key Management for Secured Data Transmission in Wireless Sensor Networks". Journal of Computational and Theoretical Nanoscience 17, n.º 5 (1 de mayo de 2020): 2163–71. http://dx.doi.org/10.1166/jctn.2020.8864.
Texto completoP. Saveetha, P. Saveetha, Y. Harold Robinson P. Saveetha, Vimal Shanmuganathan Y. Harold Robinson, Seifedine Kadry Vimal Shanmuganathan y Yunyoung Nam Seifedine Kadry. "Hybrid Energy-based Secured Clustering technique for Wireless Sensor Networks". 網際網路技術學刊 23, n.º 1 (enero de 2022): 021–31. http://dx.doi.org/10.53106/160792642022012301003.
Texto completoSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan y Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header". Indonesian Journal of Electrical Engineering and Computer Science 22, n.º 1 (1 de abril de 2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Texto completoSandip Shinde,. "Efficient Frontier Rules for Secure NFC Payments and Data Transmission". Journal of Electrical Systems 20, n.º 1s (28 de marzo de 2024): 46–57. http://dx.doi.org/10.52783/jes.751.
Texto completoSandhyaRani, M. y T. Sivaprasad. "Implementation of Cryptographic Approach for Image Transmission with Security". International Journal of Engineering & Technology 7, n.º 4.7 (27 de septiembre de 2018): 311. http://dx.doi.org/10.14419/ijet.v7i4.7.20568.
Texto completoD. S. Sandhiya, M. V. Karthikeyan y M. Shanmuga Priya. "Secured Health Monitoring System Using AES". East Asian Journal of Multidisciplinary Research 1, n.º 6 (27 de julio de 2022): 1175–82. http://dx.doi.org/10.55927/eajmr.v1i6.577.
Texto completoJoshi, Jignesh, Jagdish Rathod y Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission". Indian Journal of Science and Technology 10, n.º 20 (29 de junio de 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i19/110311.
Texto completoJoshi, Jignesh, Jagdish Rathod y Kinita Wandra. "Performance Enhancement of LEACH for Secured Data Transmission". Indian Journal of Science and Technology 10, n.º 20 (29 de junio de 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i20/110311.
Texto completoRandy, B. Renil, M. Hariharan y R. Arasa Kumar. "Secured Wireless Power Transmission Using Radio Frequency Signal". International Journal of Information Sciences and Techniques 4, n.º 3 (31 de mayo de 2014): 115–22. http://dx.doi.org/10.5121/ijist.2014.4315.
Texto completoLandu, Mahanth y Sujatha C.N. "Secured Transmission of Text using Double Encryption Algorithms". International Journal of Engineering Trends and Technology 49, n.º 5 (25 de julio de 2017): 310–16. http://dx.doi.org/10.14445/22315381/ijett-v49p248.
Texto completoAl-Haj, Ali, Gheith Abandah y Noor Hussein. "Crypto-based algorithms for secured medical image transmission". IET Information Security 9, n.º 6 (1 de noviembre de 2015): 365–73. http://dx.doi.org/10.1049/iet-ifs.2014.0245.
Texto completoHemalatha, K. y Dr P. Vijayakumar. "Indexed Steep Descent Fish Optimization with Modified Certificateless Signcryption for Secured IoT Healthcare Data Transmission". International Journal of Electrical and Electronics Research 10, n.º 2 (30 de junio de 2022): 360–63. http://dx.doi.org/10.37391/ijeer.100249.
Texto completoAgrawal,, Jay. "Web3.0 Document Security: Leveraging Blockchain Technology". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (24 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31142.
Texto completoGoel, Nidhi, Balasubramanian Raman y Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems". Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Texto completoSrinivasan, S. y C. Chandrasekar. "Adaptive File Comparison Technique for Secured Data Transmission Environment". Research Journal of Applied Sciences, Engineering and Technology 5, n.º 4 (1 de febrero de 2013): 1183–86. http://dx.doi.org/10.19026/rjaset.5.4834.
Texto completoKenfack, Gutenbert y Alain Tiedeu. "Secured Transmission of ECG Signals: Numerical and Electronic Simulations". Journal of Signal and Information Processing 04, n.º 02 (2013): 158–69. http://dx.doi.org/10.4236/jsip.2013.42023.
Texto completoHamiche, Hamid, Karim Kemih, Sid Ali Addouche, Ahmad Taher Azar, Rafik Saddaoui y Mourad Laghrouche. "Hardware implementation of a new chaotic secured transmission system". International Journal of Advanced Intelligence Paradigms 20, n.º 1/2 (2021): 58. http://dx.doi.org/10.1504/ijaip.2021.117609.
Texto completoReddy, Mittapalli Indrasena, V. Uday Kumar, K. Subba Reddy y P. Venkat Vijay Kumar. "Secured Data Transmission Using Wavelet Based Steganography And Cryptography". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, n.º 2 (30 de mayo de 2013): 311–16. http://dx.doi.org/10.24297/ijct.v6i2.3495.
Texto completoSelvaraj, Priya. "A Novel approach for Secured Transmission of DICOM Images". International Journal of Advanced Intelligence Paradigms 11, n.º 3-4 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10009380.
Texto completoLaghrouche, Mourad, Rafik Saddaoui, Ahmad Taher Azar, Sid Ali Addouche, Hamid Hamiche y Karim Kemih. "Hardware Implementation of a New Chaotic Secured transmission System". International Journal of Advanced Intelligence Paradigms 10, n.º 1 (2018): 1. http://dx.doi.org/10.1504/ijaip.2018.10023062.
Texto completoPriya, Selvaraj. "A novel approach for secured transmission of DICOM images". International Journal of Advanced Intelligence Paradigms 12, n.º 1/2 (2019): 68. http://dx.doi.org/10.1504/ijaip.2019.096953.
Texto completoSahoo, G. y Rajesh Kumar Tiwari. "Some new methodologies for secured data coding and transmission". International Journal of Electronic Security and Digital Forensics 3, n.º 2 (2010): 120. http://dx.doi.org/10.1504/ijesdf.2010.033781.
Texto completoIjeri, Sanmitra, Shivananda Pujeri, Shrikant B y Usha B A. "Image Steganography using Sudoku Puzzle for Secured Data Transmission". International Journal of Computer Applications 48, n.º 17 (30 de junio de 2012): 31–35. http://dx.doi.org/10.5120/7443-0460.
Texto completoMushenko, Alexey, Julia Dzuba, Alexey Nekrasov y Colin Fidge. "A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer". Electronics 9, n.º 3 (18 de marzo de 2020): 497. http://dx.doi.org/10.3390/electronics9030497.
Texto completoChristopher James Labrador, Gillian Claire Cancio, Krizia Dianne Congson, Kerr Jason Quevedo, Rhea Ann Verallo y James Michael Ca˜nete. "Blood Pressure Monitoring System using Remote and Secure Data Transmission". Research Briefs on Information and Communication Technology Evolution 6 (15 de diciembre de 2020): 129–43. http://dx.doi.org/10.56801/rebicte.v6i.111.
Texto completoMunshi, Asmaa. "Improved MQTT Secure Transmission Flags in Smart Homes". Sensors 22, n.º 6 (10 de marzo de 2022): 2174. http://dx.doi.org/10.3390/s22062174.
Texto completoSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle y Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device". Indonesian Journal of Electrical Engineering and Computer Science 22, n.º 1 (1 de abril de 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Texto completoMohammed Salih, Abdulkareem. "Secured Watermarking Image Using Spread Spectrum". Tikrit Journal of Engineering Sciences 23, n.º 3 (31 de agosto de 2016): 71–78. http://dx.doi.org/10.25130/tjes.23.3.08.
Texto completoBalamurugan, P., M. Shyamala Devi y V. Sharmila. "Detecting malicious nodes using data aggregation protocols in wireless sensor networks". International Journal of Engineering & Technology 7, n.º 1.1 (21 de diciembre de 2017): 594. http://dx.doi.org/10.14419/ijet.v7i1.1.10365.
Texto completoEt. al., J. Stalin,. "Fuzzy Logic Based Secured Routing In Vanets". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 11 (10 de mayo de 2021): 335–48. http://dx.doi.org/10.17762/turcomat.v12i11.5877.
Texto completoEt. al., Anitha S,. "Data Transmission with Improving Lifetime of Cluster Network". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (11 de abril de 2021): 420–28. http://dx.doi.org/10.17762/turcomat.v12i2.827.
Texto completoC, Vasuki, Dr Kavitha S y Bhuvaneswari S. "A Certain Investigation on Secured and Energy Efficient Data Transmission Techniques Over Wireless Sensor Network". Webology 18, n.º 05 (29 de octubre de 2021): 1226–35. http://dx.doi.org/10.14704/web/v18si05/web18303.
Texto completoF. M. Suaib Akhter, A., A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu y Ahmet Zengin. "A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks". Computers, Materials & Continua 68, n.º 1 (2021): 229–46. http://dx.doi.org/10.32604/cmc.2021.015447.
Texto completoSarkar, Arindam y J. K. Mandal. "Secured Transmission through Multi Layer Perceptron in Wireless Communication (STMLP)". International Journal of Mobile Network Communications & Telematics 4, n.º 4 (31 de agosto de 2014): 1–16. http://dx.doi.org/10.5121/ijmnct.2014.4401.
Texto completoXu, Min, Xiaofeng Tao, Fan Yang y Huici Wu. "Enhancing Secured Coverage With CoMP Transmission in Heterogeneous Cellular Networks". IEEE Communications Letters 20, n.º 11 (noviembre de 2016): 2272–75. http://dx.doi.org/10.1109/lcomm.2016.2598536.
Texto completoPavan Kumar, A., Lingam Gajjela y N. Raghavendra Sai. "A Hybrid Hash-Stego for Secured Message Transmission Using Stegnography". IOP Conference Series: Materials Science and Engineering 981 (5 de diciembre de 2020): 022014. http://dx.doi.org/10.1088/1757-899x/981/2/022014.
Texto completokumar, Shashi R., Anupama A. Deshponde y B. Mohankumar Naik. "Two Layer data Prediction and secured data transmission in WSN". International Journal of Engineering Trends and Technology 54, n.º 4 (25 de diciembre de 2017): 216–22. http://dx.doi.org/10.14445/22315381/ijett-v54p231.
Texto completo