Search

Your search keyword '"TELECOMMUNICATION security"' showing total 38 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security" Publisher springer nature Remove constraint Publisher: springer nature
38 results on '"TELECOMMUNICATION security"'

Search Results

1. U.S.-China 5G Competition, the Economy-Security Nexus, and Asia.

2. Multi-attribute quantum group decision-making method considering decision-makers' risk attitude.

3. OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0.

4. Text-dependent and text-independent speaker recognition of reverberant speech based on CNN.

5. A spectrum sharing model that counters eavesdropping.

6. Designing adaptive JPEG steganography based on the statistical properties in spatial domain.

7. A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights.

8. UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.

9. Secret key generation scheme from WiFi and LTE reference signals.

10. Combining artificial noise beam forming and concatenated coding schemes to effectively secure wireless communications.

11. Unimodular sequence design under frequency hopping communication compatibility requirements.

12. On the Security of a Self-Healing Group Key Distribution Scheme.

13. A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform.

14. Four-state quantum key distribution exploiting maximum mutual information measurement strategy.

15. Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.

16. Non-existence of Isolated Nodes in Secure Wireless Sensor Network.

17. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system.

18. Efficient authenticated key exchange protocols for wireless body area networks.

19. Synchronization of Fuzzy Modeling Chaotic Time Delay Memristor-Based Chua's Circuits with Application to Secure Communication.

20. Availability of 1-for- 2 shared protection systems with general repair-time distributions.

21. Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol.

22. Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique.

23. An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.

24. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system.

25. Batch Verification of Short Signatures.

26. High-Capacity Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom.

27. Reexamining the Security of Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States.

28. Chaos Synchronization in Josephson Junctions.

29. One-time proxy signature based on quantum cryptography.

30. Quantum key distribution with time coding on linearly dependent states.

31. Classical correlations can enhance the continuous-variable quantum key distribution.

32. CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.

33. Security Problems in an RFID System.

34. Geographic server distribution model for key revocation.

35. Random unitary qubit channels: entropy relations,private quantum channels and non-malleability.

36. Secure Communications System Through Concurrent AJ and LPD Evaluation.

37. On Address Privacy in Mobile Ad Hoc Networks.

38. Applicability of strange nonchaotic Wien-bridge oscillators for secure communication.

Catalog

Books, media, physical & digital resources