Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,747,210 papers from all fields of science
Search
Sign In
Create Free Account
Communications security
Known as:
Secure communications
, COMSEC
, Communication security
Expand
Communications Security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
AN/CYZ-10
Access control
Challenge–response authentication
Controlled Cryptographic Item
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Security In the Internet of Things Based on RFID: Issues and Current Countermeasures
Xiao Nie
,
X. Zhong
2013
Corpus ID: 56023577
In recent years, the internet of things (IOT) has been a focus of research. RFID (Radio Frequency Identification) as a core…
Expand
2012
2012
Improving the Security of Cloud Computing using Trusted Computing Technology
P. Senthil
,
N. Boopal
,
R. Vanathi
2012
Corpus ID: 14693115
Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new…
Expand
2012
2012
Security weakness in the Proof of Storage with Deduplication
Young-joo Shin
,
Junbeom Hur
,
Kwangjo Kim
IACR Cryptology ePrint Archive
2012
Corpus ID: 18369019
Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of…
Expand
2011
2011
AES: A SYMMETRIC KEY CRYPTOGRAPHIC SYSTEM
Punita Meelu
,
Sitender Malik
2011
Corpus ID: 55050213
With the introduction of the computer, the need for automated tools for protecting files and other information stored on the…
Expand
Highly Cited
2010
Highly Cited
2010
Random Binary Code Generation Using Dark-Bright Soliton Conversion Control Within a PANDA Ring Resonator
Thanawat Phatharaworamet
,
C. Teeka
,
Rangsan Jomtarak
,
S. Mitatha
,
P. Yupapin
Journal of Lightwave Technology
2010
Corpus ID: 40161825
In this paper, we have derived and presented the dynamic behavior of dark-bright soliton collision within the modified add/drop…
Expand
2010
2010
A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method
Souvik Bhattacharyya
,
Gautam Sanyal
2010
Corpus ID: 16154726
—Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is…
Expand
2008
2008
Communication Security in Wireless Sensor Networks
K. Ren
,
Wenjing Lou
2008
Corpus ID: 114785503
A wireless sensor network (WSN) usually consists of a large number of small, low-cost devices that have limited energy supply…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
2005
2005
Generating policies for defense in depth
P. Rubel
,
Michael Ihde
,
S. Harp
,
C. Payne
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 13755320
Coordinating multiple overlapping defense mechanisms, at differing levels of abstraction, is fraught with the potential for…
Expand
2004
2004
Clinical web environment to assist the diagnosis of Alzheimer's disease and other dementias
C. P. Suárez Araujo
,
M. A. Perez
,
D. Pino
,
P. García Báez
,
P. F. López
2004
Corpus ID: 18959824
In this article we present a web application for an interactive and modular virtual clinical environment, (EDEVITALZH), which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE