搜索结果: 1-9 共查到“通信技术 security”相关记录9条 . 查询时间(0.171 秒)
第三届IEEE国际无线传感器网络信任与安全研讨会(The 3rd IEEE International Workshop on Trust and Security in Wireless Sensor Networks)
第三届 IEEE 国际无线传感器网络 全研讨会
2017/3/30
The third IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN 2017), in conjunction with "The 16th IEEE International Conference on Trust, Security and Privacy in C...
第16届IEEE计算和通信信任,安全和隐私国际会议(16th IEEE International Conference on Trust, Security And Privacy In Computing And Communications)(TrustCom2017)
第16届 IEEE计算和通信 信任 国际会议
2017/3/30
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, ...
第五次复杂网络物理系统安全和服务国际研讨会(The 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services) (INTRICATE-SEC 2017)
第五次 复杂网络物理系统安全和服务 国际研讨会
2017/3/27
Cyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, medical systems management, and ...
2016 13th International Conference on Security and Cryptography (SECRYPT)
information communication security
2016/7/19
SECRYPT is an annual international conference covering research in information and communication security. The 13th International Conference on Security and Cryptography (SECRYPT 2016) will be held in...
Wireless Physical-Layer Security Performance of UWB systems
UWB security wireless physical layer
2014/12/8
Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages tran...
Dynamic Secrets in Communication Security
Applied sciences Communication security Dynamic secrets Key management Wireless security
2014/11/7
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic secrets, to provide secrecy to cryptographic keys in secure communications. In the conventional parad...
Leading researchers to discuss privacy and security in a connected age
Internet era banks electrical grids
2014/10/30
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Enforcing Private Policy via Security-by-Contract
Enforcing Private Policy via Security-by-Contract
2010/9/25
This work aims to investigate how the Security-by-Contract (SxC)paradigm, developed for providing security assurances to mobileapplications, can be used for guaranteeing the security ofcommunicating s...
RFID and Application Security
RFID application security privacy availability integrity non-repudiation
2014/3/11
The question of how well radio-frequency identification (RFID) technology can maintain security in business applications continues to plague both information system developers and endconsumers. Today’...