Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,389,676 papers from all fields of science
Search
Sign In
Create Free Account
Communications security
Known as:
Secure communications
, COMSEC
, Communication security
Expand
Communications Security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
AN/CYZ-10
Access control
Challenge–response authentication
Controlled Cryptographic Item
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Cryptographically secure radios based on directional modulation
V. Pellegrini
,
F. Principe
,
Giacomo de Mauro
,
R. Guidi
,
V. Martorelli
,
R. Cioni
IEEE International Conference on Acoustics…
2014
Corpus ID: 1904814
Directional modulation (DM) can be regarded as a new frontier in physical layer communication security. This new technique uses…
Expand
Review
2014
Review
2014
A comparative review on the wireless implantable medical devices privacy and security
Z. E. Ankaralı
,
Q. Abbasi
,
A. Demir
,
E. Serpedin
,
K. Qaraqe
,
H. Arslan
4th International Conference on Wireless Mobile…
2014
Corpus ID: 26391881
Nowadays wireless communication is playing a vital role in implantable medical devices (IMDs) on health-care applications. It has…
Expand
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
2013
2013
A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network
Yiying Zhang
,
Chunying Wu
,
Jinping Cao
,
Xiangzhen Li
Int. J. Distributed Sens. Networks
2013
Corpus ID: 29550297
Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open…
Expand
2013
2013
Substation Communication Security Research Based on Hybrid Encryption of DES and RSA
Fangfang Wang
,
Huazhong Wang
,
Dongqing Chen
,
Peng Yong
Ninth International Conference on Intelligent…
2013
Corpus ID: 16934598
Real time performance is in rigorous demand in substation. IEC 61850, the only international standard in substation automation…
Expand
2013
2013
A hierarchical attribute-based encryption scheme
Xiubin Zou
Wuhan University Journal of Natural Sciences
2013
Corpus ID: 18228404
According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption…
Expand
2012
2012
Protecting health information on mobile devices
M. Ahmed
,
M. Ahamad
Conference on Data and Application Security and…
2012
Corpus ID: 2836584
Mobile applications running on devices such as smart phones and tablets will be increasingly used to provide convenient access to…
Expand
Highly Cited
2010
Highly Cited
2010
Random Binary Code Generation Using Dark-Bright Soliton Conversion Control Within a PANDA Ring Resonator
Thanawat Phatharaworamet
,
C. Teeka
,
Rangsan Jomtarak
,
S. Mitatha
,
P. Yupapin
Journal of Lightwave Technology
2010
Corpus ID: 40161825
In this paper, we have derived and presented the dynamic behavior of dark-bright soliton collision within the modified add/drop…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
2000
2000
LAN security: problems and solutions for Ethernet networks
Rinat Khoussainov
,
Ahmed Patel
2000
Corpus ID: 17270539
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE