Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,978,490 papers from all fields of science
Search
Sign In
Create Free Account
Communications security
Known as:
Secure communications
, COMSEC
, Communication security
Expand
Communications Security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
AN/CYZ-10
Access control
Challenge–response authentication
Controlled Cryptographic Item
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Performance Analysis of Authentication Protocols Used Within Cooperative - Intelligent Transportation Systems with Focus on Security
Ján Durech
,
M. Franeková
,
P. Holecko
,
E. Bubeníková
Conference on Transport Systems Telematics
2015
Corpus ID: 20151274
The authors of this contribution focus on analysis of V2V communication security solutions in Cooperative - Intelligent…
Expand
2013
2013
Security In the Internet of Things Based on RFID: Issues and Current Countermeasures
Xiao Nie
,
X. Zhong
2013
Corpus ID: 56023577
In recent years, the internet of things (IOT) has been a focus of research. RFID (Radio Frequency Identification) as a core…
Expand
2012
2012
Improving the Security of Cloud Computing using Trusted Computing Technology
P. Senthil
,
N. Boopal
,
R. Vanathi
2012
Corpus ID: 14693115
Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new…
Expand
2012
2012
Security weakness in the Proof of Storage with Deduplication
Young-joo Shin
,
Junbeom Hur
,
Kwangjo Kim
IACR Cryptology ePrint Archive
2012
Corpus ID: 18369019
Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of…
Expand
2011
2011
AES: A SYMMETRIC KEY CRYPTOGRAPHIC SYSTEM
Punita Meelu
,
Sitender Malik
2011
Corpus ID: 55050213
With the introduction of the computer, the need for automated tools for protecting files and other information stored on the…
Expand
2010
2010
A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method
Souvik Bhattacharyya
,
Gautam Sanyal
2010
Corpus ID: 16154726
—Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is…
Expand
2008
2008
Communication Security in Wireless Sensor Networks
K. Ren
,
Wenjing Lou
2008
Corpus ID: 114785503
A wireless sensor network (WSN) usually consists of a large number of small, low-cost devices that have limited energy supply…
Expand
2005
2005
Generating policies for defense in depth
P. Rubel
,
Michael Ihde
,
S. Harp
,
C. Payne
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 13755320
Coordinating multiple overlapping defense mechanisms, at differing levels of abstraction, is fraught with the potential for…
Expand
2004
2004
Clinical web environment to assist the diagnosis of Alzheimer's disease and other dementias
C. P. Suárez Araujo
,
M. A. Perez
,
D. Pino
,
P. García Báez
,
P. F. López
2004
Corpus ID: 18959824
In this article we present a web application for an interactive and modular virtual clinical environment, (EDEVITALZH), which…
Expand
2003
2003
Hierarchical and Declarative Security for Grid Applications
I. Attali
,
D. Caromel
,
Arnaud Contes
International Conference on High Performance…
2003
Corpus ID: 9804961
Grid applications must be able to cope with large variations in deployment: from intra-domain to multiple domains, going over…
Expand