Gotowa bibliografia na temat „Secured transmission”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secured transmission”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Secured transmission"
E, Kanniga. "Huffman Algorithm for Secured Data Transmission". International Journal of Psychosocial Rehabilitation 23, nr 3 (30.07.2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Pełny tekst źródłaDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio i Przemysław Jedlikowski. "Secured wired BPL voice transmission system". Scientific Journal of the Military University of Land Forces 198, nr 4 (15.12.2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Pełny tekst źródłaNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, nr 5 (31.05.2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Pełny tekst źródłaSultana, Jeenat, i Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 6 (1.12.2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Pełny tekst źródłaSrinivasan, P., A. Kannagi i P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems". Journal of Medical Imaging and Health Informatics 11, nr 11 (1.11.2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Pełny tekst źródłaEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 3 (11.04.2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Pełny tekst źródłaPadmaja, P., i G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks". International Journal of Mobile Computing and Multimedia Communications 8, nr 1 (styczeń 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Pełny tekst źródłaKARTHIKEYAN, A., i GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER". i-manager’s Journal on Wireless Communication Networks 6, nr 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Pełny tekst źródłapandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography". International Journal of Innovative Research in Computer and Communication Engineering 03, nr 03 (30.03.2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Pełny tekst źródłaSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS". International Journal of Advanced Research in Computer Science 8, nr 9 (30.09.2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Pełny tekst źródłaRozprawy doktorskie na temat "Secured transmission"
Mal, Satadal. "Development of Microprocessor Based Encoders for Secured Transmission". Thesis, University of North Bengal, 2003. http://hdl.handle.net/123456789/25.
Pełny tekst źródłaSinha, Sharad. "An Approach towards Design and Implementation of Microprocessor-Based Cryptosystems for Secured Transmission". Thesis, University of North Bengal, 2007. http://hdl.handle.net/123456789/12.
Pełny tekst źródłaLOMBARDI, FLAVIO. "Reliable Secure Multicast Data Transmission and Applications". Doctoral thesis, La Sapienza, 2005. http://hdl.handle.net/11573/917049.
Pełny tekst źródłaYang, Q. "Secure message transmission in the general adversary model". Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Pełny tekst źródłaRahbari, Hanif. "Obfuscation of Transmission Fingerprints for Secure Wireless Communications". Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612371.
Pełny tekst źródłaUrsini, Leonora. "Optical Chaotic Transmission Systems For Secure Data Communication". Doctoral thesis, Università degli studi di Padova, 2009. http://hdl.handle.net/11577/3425929.
Pełny tekst źródłaL'attività di Ricerca, presentata in questa Tesi, è stata parte del Progetto di Rilevante Interesse Nazionale (PRIN), finanziato dal Ministero dell'Università e della Ricerca, e intitolato ``Trasmissione in fibra ottica su portante ottica caotica'' (PRIN200509125), svolto in collaborazione fra le Università di Padova, Pavia e l'Aquila. La protezione nel trasferimento delle informazioni è, da sempre, una delle caratterisctiche più richieste ai mezzi di comunicazione. I metodi sia crittografici che steganografici, atti a garantire sicurezza agli utenti che scambiano in rete dati sensibili, costituiscono un grosso filone di ricerca. Lo scopo di questa Tesi è dimostrare la comunicazione di un messaggio su un canale in fibra ottica, utilizzando una tecnica che si basa sul principio di sincronizzazione di una coppia di laser, operanti nel regime caotico. Il caos deterministico è un regime di alcuni sistemi dinamici non-lineari, che si caratterizza con evoluzioni irregolari, fortemente dipendenti dalle condizioni iniziali. Il regime caotico, nei laser, si manifesta con rapide ed apparentemente casuali oscillazioni della forma d'onda emessa. Nello schema di trasmissione, il trasmettitore è costituito da un generatore di messaggi e da un laser caotico, detto master, che funge da portante ottica; il messaggio d'informazione da trasmettere è opportunamente sovrapposto all'emissione del master, realizzando uno schema di protezione di tipo steganografico. Al ricevitore, l'estrazione del messaggio si basa sulla disponibilità di un altro laser, detto slave, che generi un'identica forma d'onda caotica (sincronizzazione), da sottrarre al segnale trasmesso. Perchè ciò sia possibile, data la forte dipendenza del caos dalle condizioni iniziali e dai valori dei parametri dei laser, è necessario disporre di una coppia di laser avente parametri molto simili. Questo fatto, aggiunto ad una efficiente mascheratura del messaggio, rende molto difficile la decodifica da parte di un ascoltatore non autorizzato. L'efficacia di tale tecnica si basa sulla qualità della sincronizzazione, che può degradarsi, oltre che per una scelta non corretta dei due laser, anche per gli effetti distorsivi della fibra ottica su cui si trasmette il segnale, come attenuazione, dispersione cromatica, effetti nonlineari e di polarizzazione, e dal rumore. In questa Tesi, si è studiato, da un punto di vista teorico e numerico il sistema caotico su fibra ottica, analizzandone le prestazioni per varie configurazioni. Lo studio ha riguardato: la generazione del caos di un laser a semiconduttore, mediante retroriflessione del segnale con uno specchio esterno; l'analisi della sincronizzazione con un laser gemello; la modellizzazione del canale ottico; l'analisi delle prestazioni del sistema caotico per la steganografia di messaggi digitali. Nella Tesi, sono anche presentati metodi originali per migliorare le prestazioni di sicurezza e recupero del messaggio. Infine, è stato implementato anche un dimostratore del sistema, in collaborazione con l'Università di Pavia.
Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell". University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Pełny tekst źródłaPfennig, Stefan, i Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Pełny tekst źródłaPfennig, Stefan, i Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency". Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Pełny tekst źródłaZhang, Xin. "Secure Data Management and Transmission Infrastructure for the Future Smart Grid". Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/14657.
Pełny tekst źródłaKsiążki na temat "Secured transmission"
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Znajdź pełny tekst źródłaKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Znajdź pełny tekst źródłaShankar, K., i Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Pełny tekst źródłaWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Znajdź pełny tekst źródłaWade, Edwards, red. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Znajdź pełny tekst źródłaK, Kokula Krishna Hari, red. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Znajdź pełny tekst źródła1967-, Barthe Gilles, red. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Znajdź pełny tekst źródła1967-, Barthe Gilles, red. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Znajdź pełny tekst źródłaCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Znajdź pełny tekst źródłaShankar, K., i Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Znajdź pełny tekst źródłaCzęści książek na temat "Secured transmission"
Baliś, Bartosz, Marian Bubak, Wojciech Rza̧sa i Tomasz Szepieniec. "Efficiency of the GSI Secured Network Transmission". W Computational Science - ICCS 2004, 107–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24685-5_14.
Pełny tekst źródłaJuneja, Mamta, i Parvinder Singh Sandhu. "Image Segmentaion and Steganography for Secured Information Transmission". W Communications in Computer and Information Science, 617–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_114.
Pełny tekst źródłaSadegh Amiri, Iraj, Sayed Ehsan Alavi i Sevia Mahdaliza Idrus. "Results of Digital Soliton Pulse Generation and Transmission Using Microring Resonators". W Soliton Coding for Secured Optical Communication Link, 41–56. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-161-9_3.
Pełny tekst źródłaAdi Narayana Reddy, K., V. Madhu Viswanatham i B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission". W Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Pełny tekst źródłaPrabhu, Pavithra, i K. N. Manjunath. "Secured Image Transmission in Medical Imaging Applications—A Survey". W Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 125–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_12.
Pełny tekst źródłaRath, Arabinda, S. Q. Baig, Bisakha Biswal i Gayatri Devi. "Secured Data Transmission in Low Power WSN with LoRA". W Lecture Notes in Networks and Systems, 417–24. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9967-2_39.
Pełny tekst źródłaSamoud, A., i A. Cherif. "Implementation of a cryptography algorithm for secured image transmission". W Innovative and Intelligent Technology-Based Services for Smart Environments – Smart Sensing and Artificial Intelligence, 229–34. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003181545-33.
Pełny tekst źródłaThirumarai Selvi, C., R. S. Sankarasubramanian i M. MuthuKrishnan. "Encryption and Decryption of Image for Secured Data Transmission". W Futuristic Communication and Network Technologies, 145–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4625-6_15.
Pełny tekst źródłaRavi, Kalkundri, Rajashri Khanai i Kalkundri Praveen. "Analysis of Cryptographic Algorithms for Secured Data Transmission in VANETs". W Lecture Notes in Electrical Engineering, 433–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0626-0_34.
Pełny tekst źródłaPrabhu, Pavithra, i K. N. Manjunath. "Secured Transmission of Medical Images in Radiology Using AES Technique". W Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 103–12. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_10.
Pełny tekst źródłaStreszczenia konferencji na temat "Secured transmission"
Gudda, Jagadevi C., Vijayrani Katkam, Nisha SL, K. Aruna Bhaskar i Naveen I. G. "Secured Data Transmission in Multiplexing System". W 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2023. http://dx.doi.org/10.1109/icicacs57338.2023.10099954.
Pełny tekst źródłaJebarani, M. R. Ebenezar, P. Kavipriya, S. Lakshmi i T. Vino. "Secured SMS Transmission using Android App". W 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395777.
Pełny tekst źródłaPal, Dipankar, i Nabin Ghoshal. "Secured data transmission through audio signal (SDTAS)". W 2014 9th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2014. http://dx.doi.org/10.1109/iciinfs.2014.7036649.
Pełny tekst źródłaAnand, R., Abhishek Krishna V P, Dhanesh U M i Gowtham Vas. "Secured agriculture crop monitoring using Blockchain". W 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2022. http://dx.doi.org/10.1109/icpects56089.2022.10047749.
Pełny tekst źródłaLeang, Bunrong, Rock-Won Kim i Kwan-Hee Yoo. "Real-Time Transmission of Secured PLCs Sensing Data". W 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00177.
Pełny tekst źródłaSupriadi, Agusma Wajiansyah, Hari purwadi, Rheo Malani, Arda Yunianta i Adi Pratomo. "Secured Data Transmission using Metadata Logger Manipulation Approach". W 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878601.
Pełny tekst źródłaGulappagol, Laxmi, i K. B. ShivaKumar. "Secured data transmission using knight and LSB technique". W 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). IEEE, 2017. http://dx.doi.org/10.1109/iceeccot.2017.8284678.
Pełny tekst źródłaCutuli, Giovanni. "Realising secured data transmission in KNX salvatore cavalieri". W 2009 7th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2009. http://dx.doi.org/10.1109/indin.2009.5195875.
Pełny tekst źródłaBhowal, Krishna, D. Sarkar, S. Biswas i P. P. Sarkar. "Secured image transmission with GA based Audio Steganography". W 2011 Annual IEEE India Conference (INDICON). IEEE, 2011. http://dx.doi.org/10.1109/indcon.2011.6139438.
Pełny tekst źródłaJagadish, Kori Madhura, i Nagamani K. "Secured Information Transmission Using Audio and Video Steganography". W 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2023. http://dx.doi.org/10.1109/csitss60515.2023.10334224.
Pełny tekst źródłaRaporty organizacyjne na temat "Secured transmission"
Han, I., S. Bond, R. Welty, Y. Du, S. Yoo, C. Reinhardt, E. Behymer, V. Sperry i N. Kobayashi. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission. Office of Scientific and Technical Information (OSTI), luty 2004. http://dx.doi.org/10.2172/15013953.
Pełny tekst źródłaPopkov, G. V. A model for the breakdown of the operation of a secure data transmission network under conditions of external destructive influences. Ailamazyan Program Systems Institute of Russian Academy of Sciences, marzec 2024. http://dx.doi.org/10.12731/ofernio.2024.25292.
Pełny tekst źródła