Search

Your search keyword '"TELECOMMUNICATION security"' showing total 36 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security" Database OAIster Remove constraint Database: OAIster
36 results on '"TELECOMMUNICATION security"'

Search Results

1. Cybersecurity considerations for communication based train control

2. Stability‐guaranteed dynamic ElGamal cryptosystem for encrypted control systems

3. Polar coding for the wiretap broadcast channel with multiple messages

4. Multi-location virtual smart grid laboratory with testbed for analysis of secure communication and remote co-simulation : concept and application to integration of Berlin, Stockholm, Helsinki

5. The hidden mailman and his mailbag : Routing path analysis from a European perspective

6. The hidden mailman and his mailbag : Routing path analysis from a European perspective

7. The hidden mailman and his mailbag : Routing path analysis from a European perspective

8. The hidden mailman and his mailbag : Routing path analysis from a European perspective

9. The hidden mailman and his mailbag : Routing path analysis from a European perspective

10. Application of dynamic programming in planning costs of telecommunication security operations to provide aid to civilian authorities

11. A Random Access Procedure Based on Tunable Puzzles

12. Certain aspects of provoding use of police units in actions of protection and rescuing in case of natural disasters

13. Route leak identification: a step toward making inter-domain routing more reliable

14. Energy-efficient physical layer packet authenticator for machine-to-machine networks

15. Secure Neighbor Position Discovery in Vehicular Networks

16. Secure lossless aggregation for Smart Grid M2M networks

17. P-CDN: Extending access control capabilities of P2P systems to provide CDN services

18. P-CDN: Extending access control capabilities of P2P systems to provide CDN services

19. P-CDN: Extending access control capabilities of P2P systems to provide CDN services

20. P-CDN: Extending access control capabilities of P2P systems to provide CDN services

21. Wireless sensor networks for intrusion detection: packet traffic modeling

22. A defense system against DDoS attacks by large-scale IP traceback

29. RBWA : an efficient random-bit window-based authentication protocol

36. Secrecy transmission capacity of decentralized wireless networks

Catalog

Books, media, physical & digital resources