Добірка наукової літератури з теми "Secure Channel Protocol (SCP)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Channel Protocol (SCP)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Channel Protocol (SCP)"
WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (December 2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.
Повний текст джерелаRubel, Paul, Jocelyne Fayn, Peter W. Macfarlane, Danilo Pani, Alois Schlögl, and Alpo Värri. "The History and Challenges of SCP-ECG: The Standard Communication Protocol for Computer-Assisted Electrocardiography." Hearts 2, no. 3 (August 24, 2021): 384–409. http://dx.doi.org/10.3390/hearts2030031.
Повний текст джерелаWANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (May 2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.
Повний текст джерелаShen, Dongsu, Wenping Ma, Meiling Wang, and Xunru Yin. "Improvement of a controlled quantum secure direct communication protocol." Modern Physics Letters B 28, no. 15 (June 17, 2014): 1450121. http://dx.doi.org/10.1142/s0217984914501218.
Повний текст джерелаSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Повний текст джерелаHarun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (September 9, 2020): 1481. http://dx.doi.org/10.3390/sym12091481.
Повний текст джерелаFu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.
Повний текст джерелаZhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.
Повний текст джерелаGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Повний текст джерелаXIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (June 2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.
Повний текст джерелаДисертації з теми "Secure Channel Protocol (SCP)"
Larsson, Fredrik. ""Halfpipe Active Channel"- developing a secure communications protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2799.
Повний текст джерелаWith the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network.
The purpose of this thesis is to develop a secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the final protocol. The result, the Halfpipe Active Channel protocol, is an authorized, encrypted, session oriented, message based and light weight protocol designed to minimize computational as well as network overhead.
This master's thesis project was defined by and performed at Zenterio AB during the second half of 2004.
Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Повний текст джерелаThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Частини книг з теми "Secure Channel Protocol (SCP)"
Niemi, Arto, Vasile Adrian Bogdan Pop, and Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol." In Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Повний текст джерелаZhou, Dan, and Shiu-Kai Chin. "Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol." In FM’99 — Formal Methods, 758–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48119-2_42.
Повний текст джерелаAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, and Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets." In Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Повний текст джерелаRantos, Konstantinos, and Konstantinos Markantonakis. "An Asymmetric Cryptography Secure Channel Protocol for Smart Cards." In Security and Protection in Information Processing Systems, 351–65. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_23.
Повний текст джерелаJavali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.
Повний текст джерелаAbdullah, Hesham Mohammed Ali, and A. V. Senthil Kumar. "Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing." In Enabling Technologies and Architectures for Next-Generation Networking Capabilities, 105–24. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6023-4.ch005.
Повний текст джерелаChandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.
Повний текст джерелаThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Encyclopedia of Information Science and Technology, Fourth Edition, 1667–75. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch145.
Повний текст джерелаThakare, Vaishali Ravindra, and John Singh K. "Secure Group Key Sharing Protocols and Cloud System." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, 71–81. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7492-7.ch007.
Повний текст джерелаChen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense, 130–45. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.
Повний текст джерелаТези доповідей конференцій з теми "Secure Channel Protocol (SCP)"
Alvermann, John, Michael Kurdziel, and William Furman. "The Secure Communication Interoperability Protocol (SCIP) over an HF Radio Channel." In MILCOM 2006. IEEE, 2006. http://dx.doi.org/10.1109/milcom.2006.302132.
Повний текст джерелаAlvermann, John M., and Michael T. Kurdziel. "The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753183.
Повний текст джерелаEffendi, Mufid Ridlo, Ridwan Sidik Al-Falah, Sarbini, and Nanang Ismail. "IoT-Based Battery Monitoring System in Solar Power Plants with Secure Copy Protocol (SCP)." In 2021 7th International Conference on Wireless and Telematics (ICWT). IEEE, 2021. http://dx.doi.org/10.1109/icwt52862.2021.9678210.
Повний текст джерелаRay, Baishakhi, and Shivakant Mishra. "A Protocol for Building Secure and Reliable Covert Channel." In 2008 Sixth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2008. http://dx.doi.org/10.1109/pst.2008.26.
Повний текст джерелаBerchtold, Waldemar, Patrick Lieb, and Martin Steinebach. "Secure communication protocol for a low-bandwidth audio channel." In 2017 25th European Signal Processing Conference (EUSIPCO). IEEE, 2017. http://dx.doi.org/10.23919/eusipco.2017.8081601.
Повний текст джерелаObinna, Omego, Eckhard Pfluegel, Charles A. Clarke, and Martin J. Tunnicliffe. "A multi-channel steganographic protocol for secure SMS mobile banking." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356393.
Повний текст джерелаMahmood, Baban, Ahmed Ibrahim, and D. Manivannan. "SAriadne: A secure source routing protocol to prevent hidden-channel attacks." In 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2016. http://dx.doi.org/10.1109/wimob.2016.7763267.
Повний текст джерелаAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, and Serge Chaumette. "An efficient, secure and trusted channel protocol for avionics wireless networks." In 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE, 2016. http://dx.doi.org/10.1109/dasc.2016.7777967.
Повний текст джерелаIsaka, Motohiko. "An unconditionally secure protocol based on lattices over the Gaussian channel." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895618.
Повний текст джерелаPoh, Geong Sen, Kok-Lim Alvin Yau, and Mee Hong Ling. "Analysis of a secure cooperative channel sensing protocol for cognitive radio networks." In the Fifth International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2388576.2388581.
Повний текст джерела