Gotowa bibliografia na temat „END TO END SECURED”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „END TO END SECURED”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "END TO END SECURED"
Goel, Nidhi, Balasubramanian Raman i Indra Gupta. "Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems". Advances in Multimedia 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/910106.
Pełny tekst źródłaLogunleko, Abolore Muhamin, Kolawole Bariu Logunleko i Olanrewaju Olaide Lawal. "An End-to-End Secured Email System using Base64 Algorithm". International Journal of Computer Applications 175, nr 28 (28.10.2020): 1–6. http://dx.doi.org/10.5120/ijca2020920669.
Pełny tekst źródłaChalouf, M. A., i F. Krief. "A secured, automated, and dynamic end-to-end service level negotiation". Concurrency and Computation: Practice and Experience 25, nr 2 (18.01.2012): 180–202. http://dx.doi.org/10.1002/cpe.2806.
Pełny tekst źródłaMathur, Avijit, Thomas Newe, Walid Elgenaidi, Muzaffar Rao, Gerard Dooly i Daniel Toal. "A secure end-to-end IoT solution". Sensors and Actuators A: Physical 263 (sierpień 2017): 291–99. http://dx.doi.org/10.1016/j.sna.2017.06.019.
Pełny tekst źródłaSwati Salunkhe et al. "Advanced End-to-End Image Encryption and Compression". Proceeding International Conference on Science and Engineering 11, nr 1 (18.02.2023): 282–90. http://dx.doi.org/10.52783/cienceng.v11i1.125.
Pełny tekst źródłaGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet i Yves Mathieu. "Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors". IEEE Design & Test of Computers 24, nr 6 (listopad 2007): 546–55. http://dx.doi.org/10.1109/mdt.2007.202.
Pełny tekst źródłaGuilley, Sylvain, Florent Flament, Philippe Hoogvorst, Renaud Pacalet i Yves Matheiu. "Secured CAD back-end flow for power-analysis resistant cryptoprocessors". IEEE Design & Test of Computers 24, nr 99 (2007): x2. http://dx.doi.org/10.1109/mdt.2007.4343579.
Pełny tekst źródłaHardjono, Thomas, i Tadashi Ohta. "Secure end-to-end delegations in distributed systems". Computer Communications 17, nr 3 (marzec 1994): 230–38. http://dx.doi.org/10.1016/0140-3664(94)90008-6.
Pełny tekst źródłaPramukantoro, Eko Sakti, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji i Deny Hari Prasetya Dewa. "Implementasi Mekanisme End-To-End Security pada IoT Middleware". Jurnal Teknologi Informasi dan Ilmu Komputer 6, nr 3 (9.05.2019): 335. http://dx.doi.org/10.25126/jtiik.2019631401.
Pełny tekst źródłaAhmad, Mudassar, Majid Hussain, Beenish Abbas, Omar Aldabbas, Uzma Jamil, Rehan Ashraf i Shahla Asadi. "End-to-End Loss Based TCP Congestion Control Mechanism as a Secured Communication Technology for Smart Healthcare Enterprises". IEEE Access 6 (2018): 11641–56. http://dx.doi.org/10.1109/access.2018.2802841.
Pełny tekst źródłaRozprawy doktorskie na temat "END TO END SECURED"
Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks". Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.
Pełny tekst źródłaCellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided... [edited by Author]
IX n.s.
Tahir, Ruhma. "An ICMetric based framework for secure end-to-end communication". Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22281/.
Pełny tekst źródłaVogt, Christian. "Efficient and Secure End-to-End Mobility Support in IPv6". [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007211.
Pełny tekst źródłaNemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation". Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Pełny tekst źródłaQC 20170831
PROSPER
HASPOC
Schmidt, Dawin. "A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption". Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196360.
Pełny tekst źródłaEnd-to-end kryptering är en allt mer vanligt förekommande funktionalitet bland populära mobila chatttjänster (händanefter appar) med miljontals användare. Under de två senaste åren har många ledande chattappar, bland annat LINE, KakaoTalk, Viber, Facebook Messenger, och WhatsApp, börjat använda end-to-end kryptering. Dock så är de flesta av dessa appar closed-source och det finns begränsad, eller ingen, fristående granskning av systemdesignen för deras end-to-end kryptering. Dessa implementationer kan innebära en stor risk då proprietära chattappar kan använda sig av kryptografiska algoritmer som inte följer best practice för säkerhet eller kryptografi. Vidare så kan statliga myndigheter tvinga de som tillhandahåller chattappar att använda lättdekrypterad export-grade kryptografi för sina produkter. Lägg till det att de flesta vanliga appar har många ytor som kan attackeras, till följd av all funktionalitet de erbjuder. Som ett resultat av detta finns en risk för mjukvarubrister som kan utnyttjas av en hackare för att inkräkta på en användares end-to-end integritet. Ytterligare ett problem är att trots att det är closed-source mjukvara så marknadsför ofta appleverantörerna sina appar som att vara är så säkra att inte ens leverantörerna själva kan dekryptera användarnas meddelanden. Det som hävdas i marknadsföringen riskerar vara missledande eftersom de flesta användarna inte har den tekniska kunskap som krävs för att kunna verifiera att det som hävdas är sant. I den här Master-uppsatsen använder vi KakaoTalk – den mest populära chattappen i Sydkorea – som en fallstudie för att granska och bedömma säkerhetens- och integritets-aspekterna hos deras valbara “Secure Chat” med end-to-end krypteringsfunktionalitet. Vi granskar även KakaoTalk’s användarvillkor för att kunna verifiera påståenden som att “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” från ett tekniskt perspektiv. Det huvudsakliga syftet med denna studien är att belysa hur olika brister i en produkt sammantagna kan skapa en risk för allvarliga vektorattacker mot end-to-end integriteten även fast det finns flera skyddslager. Mer specifikt visar vi hur en central katalogserver för public-keys gör end-to-end krypteringssystemet sårbart mot välkända operator-site man-in-the-middle-attacker. Trots att denna naiva typ av attack kan verka uppenbar, argumenterar vi för att (KakaoTalk) användare borde veta om styrkorna och svagheterna med en särskild systemdesign för att kunna göra ett informerat val för om de ska lita på säkerheten hos en chattapplikation eller inte.
Vogt, Christian [Verfasser]. "Efficient and Secure End-to-End Mobility Support in IPv6 / Christian Vogt". Aachen : Shaker, 2007. http://d-nb.info/1164340271/34.
Pełny tekst źródłaUnurkhaan, Esbold. "Secure end-to-end transport over SCTP a new security extension for SCTP /". [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=975686569.
Pełny tekst źródłaKühner, Holger [Verfasser], i H. [Akademischer Betreuer] Hartenstein. "Performance of End-to-End Secure Data Sharing / Holger Kühner ; Betreuer: H. Hartenstein". Karlsruhe : KIT-Bibliothek, 2017. http://d-nb.info/1132997763/34.
Pełny tekst źródłaChan, Siu Ping. "End-to-end streaming protocols with QoS control for secure IP multimedia communications /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHAN.
Pełny tekst źródłaIncludes bibliographical references (leaves 167-175). Also available in electronic version. Access restricted to campus users.
Seggelmann, Robin [Verfasser], Erwin P. [Akademischer Betreuer] Rathgeb i Bruno [Akademischer Betreuer] Müller-Clostermann. "SCTP : Strategies to Secure End-To-End Communication / Robin Seggelmann. Gutachter: Bruno Müller-Clostermann. Betreuer: Erwin P. Rathgeb". Duisburg, 2013. http://d-nb.info/1030475571/34.
Pełny tekst źródłaKsiążki na temat "END TO END SECURED"
Delusions of intelligence: Enigma, Ultra and the end of secure ciphers. New York: Cambridge University Press, 2006.
Znajdź pełny tekst źródłaKeith, Hollihan, red. The end of energy obesity: Breaking today's energy addiction for a prosperous and secure tomorrow. Hoboken, N.J: John Wiley & Sons, 2009.
Znajdź pełny tekst źródłaMoney for life: The "money makeover" that will end your worries and secure your dreams. New York: Simon & Schuster, 1991.
Znajdź pełny tekst źródłaEnd to end. Long Preston: Dales Large Print Books, 2009.
Znajdź pełny tekst źródłaBergsmann, Stefan. End-to-End-Geschäftsprozessmanagement. Vienna: Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0840-6.
Pełny tekst źródłaDiane, McMichael Gilster, red. Bluetooth end to end. New York, NY: M&T Books, 2002.
Znajdź pełny tekst źródłaTrust, Leeds Civic, red. Bridge End - dead end?. Leeds: Leeds Civic Trust, 2000.
Znajdź pełny tekst źródłaBill, Mann, red. Wireless devices end to end. New York, NY: Hungry Minds, 2002.
Znajdź pełny tekst źródła1952-, Tabernero Antonio, red. Madrid: From end to end. Madrid: Ediciones Aldeasa, 2003.
Znajdź pełny tekst źródłaEnd-to-end DSL architectures. Indianapolis, IN: Cisco Press, 2003.
Znajdź pełny tekst źródłaCzęści książek na temat "END TO END SECURED"
Guo, Dapeng, Melody Moh i Teng-Sheng Moh. "End-to-End Learning for Autonomous Driving in Secured Smart Cities". W Data-Driven Mining, Learning and Analytics for Secured Smart Cities, 229–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72139-8_11.
Pełny tekst źródłaBitzer, Wolfgang. "Geräte für die End-zu-Ende-Verschlüsselung". W Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication, 96–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/978-3-642-85103-2_8.
Pełny tekst źródłaHohendorf, Carsten, Erwin P. Rathgeb, Esbold Unurkhaan i Michael Tüxen. "Secure End-to-End Transport over SCTP". W Lecture Notes in Computer Science, 381–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11766155_27.
Pełny tekst źródłaCanetti, Ran, Palak Jain, Marika Swanberg i Mayank Varia. "Universally Composable End-to-End Secure Messaging". W Advances in Cryptology – CRYPTO 2022, 3–33. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15979-4_1.
Pełny tekst źródłaSousa, Patrícia R., João S. Resende, Rolando Martins i Luís Antunes. "Secure Provisioning for Achieving End-to-End Secure Communications". W Ad-Hoc, Mobile, and Wireless Networks, 498–507. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_34.
Pełny tekst źródłaSingh, Basudeo, i K. S. Jasmine. "Secure End-To-End Authentication for Mobile Banking". W Software Engineering in Intelligent Systems, 223–32. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18473-9_22.
Pełny tekst źródłaCastiglione, A., G. Cattaneo, A. De Santis, F. Petagna i U. Ferraro Petrillo. "SPEECH: Secure Personal End-to-End Communication with Handheld". W ISSE 2006 — Securing Electronic Busines Processes, 287–97. Wiesbaden: Vieweg, 2006. http://dx.doi.org/10.1007/978-3-8348-9195-2_31.
Pełny tekst źródłaEtemad, Mohammad, i Alptekin Küpçü. "Efficient Key Authentication Service for Secure End-to-End Communications". W Provable Security, 183–97. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_10.
Pełny tekst źródłaVaradharajan, V., i Y. Mu. "Design of Secure End-to-End Protocols for Mobile Systems". W Mobile Communications, 258–66. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34980-0_26.
Pełny tekst źródłaAkram, Raja Naeem, i Ryan K. L. Ko. "End-to-End Secure and Privacy Preserving Mobile Chat Application". W Information Security Theory and Practice. Securing the Internet of Things, 124–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43826-8_9.
Pełny tekst źródłaStreszczenia konferencji na temat "END TO END SECURED"
Awad, Mohammed, i Ernst L. Leiss. "End-to-End cryptographic voting: Potentials and limitations". W 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750173.
Pełny tekst źródłaPatgiri, Ripon, i Naresh Babu Muppalaneni. "Stealth: A Highly Secured End-to-End Symmetric Communication Protocol". W 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2022. http://dx.doi.org/10.1109/isncc55209.2022.9851810.
Pełny tekst źródłaSchillinger, Fabian, i Christian Schindelhauer. "Partitioned Private User Storages in End-to-End Encrypted Online Social Networks". W 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2020. http://dx.doi.org/10.23919/icitst51030.2020.9351335.
Pełny tekst źródłaLegrand, W. "Interoperability issues for end to end security: the IP Federating Network (IPFN) for digital secured mobile networks". W IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IEE, 2003. http://dx.doi.org/10.1049/ic:20030025.
Pełny tekst źródłaWinderickx, Jori, Dave Singelee i Nele Mentens. "HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing". W 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2018. http://dx.doi.org/10.1109/ccnc.2018.8319245.
Pełny tekst źródłaBhashini, K. Priya, K. Nalini i Ponnam Lalitha. "An End-to-End secured Blockchain framework for Internet of Things based smart Healthcare". W 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2023. http://dx.doi.org/10.1109/icecct56650.2023.10179650.
Pełny tekst źródłaSalant, Eliot, i Gidon Gershinsky. "End-to-end secure insurance telematics". W SYSTOR '19: The 12th ACM International Systems and Storage Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319647.3326466.
Pełny tekst źródłaChowdhury, Fahim Shahriar, Asif Istiaque, Adil Mahmud i Mohammad Miskat. "An implementation of a lightweight end-to-end secured communication system for patient monitoring system". W 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). IEEE, 2018. http://dx.doi.org/10.1109/edct.2018.8405076.
Pełny tekst źródłaZhu, Qingcheng, Xiaosong Yu, Zihao Wang, Yongli Zhao i Jie Zhang. "Demonstration of Autonomic End-to-End QoS Assurance over SDN-based QKD-Secured Optical Networks". W 2023 Opto-Electronics and Communications Conference (OECC). IEEE, 2023. http://dx.doi.org/10.1109/oecc56963.2023.10209908.
Pełny tekst źródłaNguyen, T. N. T., P. Shum i E. H. Chua. "Secure end-to-end mobile payment system". W IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207231.
Pełny tekst źródłaRaporty organizacyjne na temat "END TO END SECURED"
Chari, Suresh. MONTAGE: A Methodology for Designing Composable End-to-End Secure Distributed Systems. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2012. http://dx.doi.org/10.21236/ada563359.
Pełny tekst źródłaHunt, Will, i Remco Zwetsloot. The Chipmakers: U.S. Strengths and Priorities for the High-End Semiconductor Workforce. Center for Security and Emerging Technology, wrzesień 2020. http://dx.doi.org/10.51593/20190035.
Pełny tekst źródłaMarshak, Ronni. End-to-End Customer Experience. Boston, MA: Patricia Seybold Group, luty 2011. http://dx.doi.org/10.1571/psgp02-10-11cc.
Pełny tekst źródłaBest, Jeremy. End to End Weapons Engineering. Office of Scientific and Technical Information (OSTI), listopad 2020. http://dx.doi.org/10.2172/1711352.
Pełny tekst źródłaMalis, A. G. PSN End-to-End functional specification. RFC Editor, marzec 1986. http://dx.doi.org/10.17487/rfc0979.
Pełny tekst źródłaMathews, A., T. Kwan, K. Buescher, C. Snell i K. Adams. End-to-End Radiographic Systems Simulation. Office of Scientific and Technical Information (OSTI), lipiec 1999. http://dx.doi.org/10.2172/759186.
Pełny tekst źródłaMontenegro, G., i M. Borella. RSIP Support for End-to-end IPsec. RFC Editor, październik 2001. http://dx.doi.org/10.17487/rfc3104.
Pełny tekst źródłaMiller, Jonah. End-to-End Modeling of a Kilonova. Office of Scientific and Technical Information (OSTI), sierpień 2021. http://dx.doi.org/10.2172/1818091.
Pełny tekst źródłaDawkins, S., G. Montenegro, M. Kojo i V. Magret. End-to-end Performance Implications of Slow Links. RFC Editor, lipiec 2001. http://dx.doi.org/10.17487/rfc3150.
Pełny tekst źródłaMalas, D., i A. Morton. Basic Telephony SIP End-to-End Performance Metrics. RFC Editor, styczeń 2011. http://dx.doi.org/10.17487/rfc6076.
Pełny tekst źródła