Добірка наукової літератури з теми "Secured transmission"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secured transmission".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secured transmission"
E, Kanniga. "Huffman Algorithm for Secured Data Transmission." International Journal of Psychosocial Rehabilitation 23, no. 3 (July 30, 2019): 456–63. http://dx.doi.org/10.37200/ijpr/v23i3/pr190143.
Повний текст джерелаDebita, Grzegorz, Przemysław Falkowski-Gilski, Marcin Habrych, Bogdan Miedziński, Jan Wandzio, and Przemysław Jedlikowski. "Secured wired BPL voice transmission system." Scientific Journal of the Military University of Land Forces 198, no. 4 (December 15, 2020): 947–55. http://dx.doi.org/10.5604/01.3001.0014.6065.
Повний текст джерелаNarmadha., R. P. "OVERLAPPED WATERMARKING FOR SECURED DATA TRANSMISSION." International Journal of Advanced Research 4, no. 5 (May 31, 2016): 940–45. http://dx.doi.org/10.21474/ijar01/535.
Повний текст джерелаSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Повний текст джерелаSrinivasan, P., A. Kannagi, and P. Rajendiran. "Laplace Angular Displaced Secure Data Transmission for Internet of Things Based Health Care Systems." Journal of Medical Imaging and Health Informatics 11, no. 11 (November 1, 2021): 2868–74. http://dx.doi.org/10.1166/jmihi.2021.3883.
Повний текст джерелаEt.al, G. Aparna. "A Watermark Approach for Image Transmission: Implementation of Channel Coding Technique with Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3976–84. http://dx.doi.org/10.17762/turcomat.v12i3.1687.
Повний текст джерелаPadmaja, P., and G. V. Marutheswar. "Certain Investigation on Secured Data Transmission in Wireless Sensor Networks." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 48–61. http://dx.doi.org/10.4018/ijmcmc.2017010104.
Повний текст джерелаKARTHIKEYAN, A., and GOKUL S. SAI. "SECURED WIRELESS TRANSMISSION PROTOCOL USING NTP SERVER." i-manager’s Journal on Wireless Communication Networks 6, no. 4 (2018): 38. http://dx.doi.org/10.26634/jwcn.6.4.14294.
Повний текст джерелаpandey, K. S. Abitha, Anjali. "Secured Data Transmission Using Elliptic Curve Cryptography." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 03 (March 30, 2015): 1419–25. http://dx.doi.org/10.15680/ijircce.2015.0303003.
Повний текст джерелаSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Повний текст джерелаДисертації з теми "Secured transmission"
Mal, Satadal. "Development of Microprocessor Based Encoders for Secured Transmission." Thesis, University of North Bengal, 2003. http://hdl.handle.net/123456789/25.
Повний текст джерелаSinha, Sharad. "An Approach towards Design and Implementation of Microprocessor-Based Cryptosystems for Secured Transmission." Thesis, University of North Bengal, 2007. http://hdl.handle.net/123456789/12.
Повний текст джерелаLOMBARDI, FLAVIO. "Reliable Secure Multicast Data Transmission and Applications." Doctoral thesis, La Sapienza, 2005. http://hdl.handle.net/11573/917049.
Повний текст джерелаYang, Q. "Secure message transmission in the general adversary model." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Повний текст джерелаRahbari, Hanif. "Obfuscation of Transmission Fingerprints for Secure Wireless Communications." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612371.
Повний текст джерелаUrsini, Leonora. "Optical Chaotic Transmission Systems For Secure Data Communication." Doctoral thesis, Università degli studi di Padova, 2009. http://hdl.handle.net/11577/3425929.
Повний текст джерелаL'attività di Ricerca, presentata in questa Tesi, è stata parte del Progetto di Rilevante Interesse Nazionale (PRIN), finanziato dal Ministero dell'Università e della Ricerca, e intitolato ``Trasmissione in fibra ottica su portante ottica caotica'' (PRIN200509125), svolto in collaborazione fra le Università di Padova, Pavia e l'Aquila. La protezione nel trasferimento delle informazioni è, da sempre, una delle caratterisctiche più richieste ai mezzi di comunicazione. I metodi sia crittografici che steganografici, atti a garantire sicurezza agli utenti che scambiano in rete dati sensibili, costituiscono un grosso filone di ricerca. Lo scopo di questa Tesi è dimostrare la comunicazione di un messaggio su un canale in fibra ottica, utilizzando una tecnica che si basa sul principio di sincronizzazione di una coppia di laser, operanti nel regime caotico. Il caos deterministico è un regime di alcuni sistemi dinamici non-lineari, che si caratterizza con evoluzioni irregolari, fortemente dipendenti dalle condizioni iniziali. Il regime caotico, nei laser, si manifesta con rapide ed apparentemente casuali oscillazioni della forma d'onda emessa. Nello schema di trasmissione, il trasmettitore è costituito da un generatore di messaggi e da un laser caotico, detto master, che funge da portante ottica; il messaggio d'informazione da trasmettere è opportunamente sovrapposto all'emissione del master, realizzando uno schema di protezione di tipo steganografico. Al ricevitore, l'estrazione del messaggio si basa sulla disponibilità di un altro laser, detto slave, che generi un'identica forma d'onda caotica (sincronizzazione), da sottrarre al segnale trasmesso. Perchè ciò sia possibile, data la forte dipendenza del caos dalle condizioni iniziali e dai valori dei parametri dei laser, è necessario disporre di una coppia di laser avente parametri molto simili. Questo fatto, aggiunto ad una efficiente mascheratura del messaggio, rende molto difficile la decodifica da parte di un ascoltatore non autorizzato. L'efficacia di tale tecnica si basa sulla qualità della sincronizzazione, che può degradarsi, oltre che per una scelta non corretta dei due laser, anche per gli effetti distorsivi della fibra ottica su cui si trasmette il segnale, come attenuazione, dispersione cromatica, effetti nonlineari e di polarizzazione, e dal rumore. In questa Tesi, si è studiato, da un punto di vista teorico e numerico il sistema caotico su fibra ottica, analizzandone le prestazioni per varie configurazioni. Lo studio ha riguardato: la generazione del caos di un laser a semiconduttore, mediante retroriflessione del segnale con uno specchio esterno; l'analisi della sincronizzazione con un laser gemello; la modellizzazione del canale ottico; l'analisi delle prestazioni del sistema caotico per la steganografia di messaggi digitali. Nella Tesi, sono anche presentati metodi originali per migliorare le prestazioni di sicurezza e recupero del messaggio. Infine, è stato implementato anche un dimostratore del sistema, in collaborazione con l'Università di Pavia.
Chaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Повний текст джерелаPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Повний текст джерелаPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Повний текст джерелаZhang, Xin. "Secure Data Management and Transmission Infrastructure for the Future Smart Grid." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/14657.
Повний текст джерелаКниги з теми "Secured transmission"
Kotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, Ind: Cisco Press, 2008.
Знайти повний текст джерелаKotfila, David A. CCNP implementing secured converged WANs (ISCW 642-825) lab portfolio. Indianapolis, IN: Cisco Press, 2008.
Знайти повний текст джерелаShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5.
Повний текст джерелаWu, Gilbert S. K. SGML support for secure document systems. Boston Spa: British Library Research and Development Department, 1994.
Знайти повний текст джерелаWade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. San Francisco, Calif: SYBEX, 2004.
Знайти повний текст джерелаK, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Знайти повний текст джерела1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: International workshop, CASSIS 2004, Marseille, France, March 10-14, 2004 : revised selected papers. Berlin: Springer, 2005.
Знайти повний текст джерела1967-, Barthe Gilles, ed. Construction and analysis of safe, secure, and interoperable smart devices: Second international workshop, CASSIS 2005, Nice, France, March 8-11, 2005 : revised selected papers. Berlin: Springer, 2006.
Знайти повний текст джерелаCCNP Implementing Secured Converged WANs (ISCW 642-825) Lab Portfolio (Cisco Networking Academy Program) (Lab Companion). Cisco Press, 2008.
Знайти повний текст джерелаShankar, K., and Mohamed Elhoseny. Secure Image Transmission in Wireless Sensor Network Applications. Springer, 2019.
Знайти повний текст джерелаЧастини книг з теми "Secured transmission"
Baliś, Bartosz, Marian Bubak, Wojciech Rza̧sa, and Tomasz Szepieniec. "Efficiency of the GSI Secured Network Transmission." In Computational Science - ICCS 2004, 107–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24685-5_14.
Повний текст джерелаJuneja, Mamta, and Parvinder Singh Sandhu. "Image Segmentaion and Steganography for Secured Information Transmission." In Communications in Computer and Information Science, 617–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_114.
Повний текст джерелаSadegh Amiri, Iraj, Sayed Ehsan Alavi, and Sevia Mahdaliza Idrus. "Results of Digital Soliton Pulse Generation and Transmission Using Microring Resonators." In Soliton Coding for Secured Optical Communication Link, 41–56. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-161-9_3.
Повний текст джерелаAdi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science, 284–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Повний текст джерелаPrabhu, Pavithra, and K. N. Manjunath. "Secured Image Transmission in Medical Imaging Applications—A Survey." In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 125–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_12.
Повний текст джерелаRath, Arabinda, S. Q. Baig, Bisakha Biswal, and Gayatri Devi. "Secured Data Transmission in Low Power WSN with LoRA." In Lecture Notes in Networks and Systems, 417–24. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9967-2_39.
Повний текст джерелаSamoud, A., and A. Cherif. "Implementation of a cryptography algorithm for secured image transmission." In Innovative and Intelligent Technology-Based Services for Smart Environments – Smart Sensing and Artificial Intelligence, 229–34. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003181545-33.
Повний текст джерелаThirumarai Selvi, C., R. S. Sankarasubramanian, and M. MuthuKrishnan. "Encryption and Decryption of Image for Secured Data Transmission." In Futuristic Communication and Network Technologies, 145–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4625-6_15.
Повний текст джерелаRavi, Kalkundri, Rajashri Khanai, and Kalkundri Praveen. "Analysis of Cryptographic Algorithms for Secured Data Transmission in VANETs." In Lecture Notes in Electrical Engineering, 433–43. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0626-0_34.
Повний текст джерелаPrabhu, Pavithra, and K. N. Manjunath. "Secured Transmission of Medical Images in Radiology Using AES Technique." In Computer Aided Intervention and Diagnostics in Clinical and Medical Images, 103–12. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04061-1_10.
Повний текст джерелаТези доповідей конференцій з теми "Secured transmission"
Gudda, Jagadevi C., Vijayrani Katkam, Nisha SL, K. Aruna Bhaskar, and Naveen I. G. "Secured Data Transmission in Multiplexing System." In 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2023. http://dx.doi.org/10.1109/icicacs57338.2023.10099954.
Повний текст джерелаJebarani, M. R. Ebenezar, P. Kavipriya, S. Lakshmi, and T. Vino. "Secured SMS Transmission using Android App." In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395777.
Повний текст джерелаPal, Dipankar, and Nabin Ghoshal. "Secured data transmission through audio signal (SDTAS)." In 2014 9th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2014. http://dx.doi.org/10.1109/iciinfs.2014.7036649.
Повний текст джерелаAnand, R., Abhishek Krishna V P, Dhanesh U M, and Gowtham Vas. "Secured agriculture crop monitoring using Blockchain." In 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2022. http://dx.doi.org/10.1109/icpects56089.2022.10047749.
Повний текст джерелаLeang, Bunrong, Rock-Won Kim, and Kwan-Hee Yoo. "Real-Time Transmission of Secured PLCs Sensing Data." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00177.
Повний текст джерелаSupriadi, Agusma Wajiansyah, Hari purwadi, Rheo Malani, Arda Yunianta, and Adi Pratomo. "Secured Data Transmission using Metadata Logger Manipulation Approach." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878601.
Повний текст джерелаGulappagol, Laxmi, and K. B. ShivaKumar. "Secured data transmission using knight and LSB technique." In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). IEEE, 2017. http://dx.doi.org/10.1109/iceeccot.2017.8284678.
Повний текст джерелаCutuli, Giovanni. "Realising secured data transmission in KNX salvatore cavalieri." In 2009 7th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2009. http://dx.doi.org/10.1109/indin.2009.5195875.
Повний текст джерелаBhowal, Krishna, D. Sarkar, S. Biswas, and P. P. Sarkar. "Secured image transmission with GA based Audio Steganography." In 2011 Annual IEEE India Conference (INDICON). IEEE, 2011. http://dx.doi.org/10.1109/indcon.2011.6139438.
Повний текст джерелаJagadish, Kori Madhura, and Nagamani K. "Secured Information Transmission Using Audio and Video Steganography." In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2023. http://dx.doi.org/10.1109/csitss60515.2023.10334224.
Повний текст джерелаЗвіти організацій з теми "Secured transmission"
Han, I., S. Bond, R. Welty, Y. Du, S. Yoo, C. Reinhardt, E. Behymer, V. Sperry, and N. Kobayashi. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission. Office of Scientific and Technical Information (OSTI), February 2004. http://dx.doi.org/10.2172/15013953.
Повний текст джерелаPopkov, G. V. A model for the breakdown of the operation of a secure data transmission network under conditions of external destructive influences. Ailamazyan Program Systems Institute of Russian Academy of Sciences, March 2024. http://dx.doi.org/10.12731/ofernio.2024.25292.
Повний текст джерела