Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,049 papers from all fields of science
Search
Sign In
Create Free Account
Transmission security
Known as:
TRANSEC
Transmission security (TRANSEC) is the component of communications security (COMSEC) that results from the application of measures designed to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptanalysis
Key (cryptography)
Operations security
Radio jamming
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Secure Framework for Medical Information Exchange (MI-X) between Healthcare Providers
Ahmed Ibrahim
,
Baban A. Mahmood
,
M. Singhal
IEEE International Conference on Healthcare…
2016
Corpus ID: 18434412
As the exchange of Electronic Health Records (EHRs) among different healthcare providers has become a point of interest, it poses…
Expand
2016
2016
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
Y. H. Robinson
,
S. Balaji
,
M. Rajaram
2016
Corpus ID: 43992555
Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations…
Expand
2016
2016
Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System
Md. Zakirul Alam Bhuiyan
,
Guojun Wang
,
Kim-Kwang Raymond Choo
IEEE 18th International Conference on High…
2016
Corpus ID: 17464740
Sensing data collected from some applications such as structural health monitoring is complex. When collected at a high-rate and…
Expand
2014
2014
Border collision bifurcations and power spectral density of chaotic signals generated by one-dimensional discontinuous piecewise linear maps
Kais Feltekh
,
Z. Jemaa
,
D. Fournier-Prunaret
,
S. Belghith
Communications in nonlinear science & numerical…
2014
Corpus ID: 123101900
2013
2013
REAL-TIME MEDICAL MONITORING SYSTEM DESIGN BASED ON INTRA-BODY COMMUNICATION
Shuang Zhang
,
Y. Qin
,
P. Mak
,
S. Pun
,
M. Vai
2013
Corpus ID: 12559739
With soaring of the sub-health population around the world, the traditional medical treatment has not met the increasing demand…
Expand
2011
2011
An Investigation on Security of Cognitive Radio Networks
Huaqing Mao
,
Li Zhu
International Conference on Management and…
2011
Corpus ID: 45755222
Cognitive Radio Networks (CRNs) emerge as a possible solution for the lack of spectrum, and make different networks merge…
Expand
2010
2010
A Large Payload EMD Embedding Scheme with High Stego-image Quality
Kuo-Nan Chen
,
Chinchen Chang
,
Huang-Ching Lin
International Conference on Computational Aspects…
2010
Corpus ID: 13624445
In this paper, we propose an efficient EMD-based data hiding scheme. To avoid the serious, but usually disregarded, overflow…
Expand
2007
2007
Medical Image Encryption Based on Pixel Arrangement and Random Permutation for Transmission Security
K. Usman
,
H. Juzoji
,
+4 authors
Seiji Igi
International Conference on e-Health Networking…
2007
Corpus ID: 37127869
This paper describes the result of our investigation on the utilization pixels arrangement and random permutation to encrypt…
Expand
2001
2001
Remote Air Sampling for Canine Olfaction
B. Wickens
Proceedings IEEE 35th Annual International…
2001
Corpus ID: 61818429
TRANSEC is the acronym of the Transport Security Division of the Department for Transport, Local Government and the Regions in…
Expand
1966
1966
Variation in Time of Flowering and Seed Dispersal of Eastern Cottonwood In the Lower Mississippi Valley
R. Farmer
1966
Corpus ID: 18666950
Flowering of Populus de Ito ides Bartr. occurred from ea rl y March to earl y April; differences between trees within s tands…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE