Quantcast
Channel: CPS-VO - Data Transmission
Browsing latest articles
Browse All 41 View Live

"Development of platform using NIOS II soft core processor for image...

S. V. Trivedi, M. A. Hasamnis.  2015.  "Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm". 2015 International Conference on...

View Article



"VLSI implementation of BER measurement for wireless communication system"

R. Saravanan, V. Saminadan, V. Thirunavukkarasu.  2015.  "VLSI implementation of BER measurement for wireless communication system". 2015 International Conference on Innovations in Information,...

View Article

Enhancing data security of iOS client by encryption algorithm

Shen, Y., Wang, H..  2017.  Enhancing data security of iOS client by encryption algorithm. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). :366–370.

View Article

A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN

Nandhini, M., Priya, P..  2017.  A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN. 2017 International Conference on Communication and Signal Processing (ICCSP). :1061–1065.

View Article

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks

Li, T., Ma, J., Sun, C., Wei, D., Xi, N..  2017.  PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. 2017 International Conference on Networking and Network Applications...

View Article


FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light...

Yildiz, O., Gulbahar, B..  2018.  FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications. 2018 14th International Wireless Communications Mobile Computing...

View Article

Optical Wireless Interception Vulnerability Analysis of Visible Light...

Lian, J., Wang, X., Noshad, M., Brandt-Pearce, M..  2018.  Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System. 2018 IEEE International Conference on...

View Article

State Estimation Based Energy Theft Detection Scheme with Privacy...

Wen, M., Yao, D., Li, B., Lu, R..  2018.  State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid. 2018 IEEE International Conference on Communications (ICC). :1-6.

View Article


A secure data aggregation protocol for fog computing based smart grids

Okay, F. Y., Ozdemir, S..  2018.  A secure data aggregation protocol for fog computing based smart grids. 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power...

View Article


Performance Analysis of Symmetric Key Cryptographic Algorithms

Vyakaranal, S., Kengond, S..  2018.  Performance Analysis of Symmetric Key Cryptographic Algorithms. 2018 International Conference on Communication and Signal Processing (ICCSP). :0411–0415.

View Article

A Lightweight Compound Defense Framework Against Injection Attacks in IIoT

Chi, Po-Wen, Wang, Ming-Hung.  2018.  A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. 2018 IEEE Conference on Dependable and Secure Computing (DSC). :1–8.

View Article

Double Encryption Using TEA and DNA

P.G., Swathi, Rajesh, Sreeja.  2018.  Double Encryption Using TEA and DNA. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). :1-5.

View Article

Research on Self-Healing Technology for Faults of Intelligent Distribution...

Liu, Xiaobao, Wu, Qinfang, Sun, Jinhua, Xu, Xia, Wen, Yifan.  2019.  Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System. 2019 IEEE 3rd Information...

View Article


A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal

Dhanya, K., Jeyalakshmi, C., Balakumar, A..  2019.  A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal. 2019 International Conference on Computer Communication and Informatics...

View Article

Selection Mechanism for Underwater Multi-Media Communication

Ko, Eunbi, M, Delphin Raj K, Yum, Sun-Ho, Shin, Soo-Young, Namgung, Jung-Il, Park, Soo-Hyun.  2019.  Selection Mechanism for Underwater Multi-Media Communication. 2019 International Conference on...

View Article


A Simultaneous Approach for Compression and Encryption Techniques Using...

Zebari, Dilovan Asaad, Haron, Habibollah, Zeebaree, Diyar Qader, Zain, Azlan Mohd.  2019.  A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid. 2019 13th...

View Article

A highly accurate machine learning approach for developing wireless sensor...

Alshinina, Remah, Elleithy, Khaled.  2018.  A highly accurate machine learning approach for developing wireless sensor network middleware. 2018 Wireless Telecommunications Symposium (WTS). :1–7.

View Article


Application of Bit Interleaving to Convolutional Codes for Short Packet...

Wang, Meng, Zhan, Ming, Yu, Kan, Deng, Yi, Shi, Yaqin, Zeng, Jie.  2019.  Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission. 2019 IEEE International Conference on...

View Article

Data Management Portfolio for Improvement of Privacy in Fog-to-cloud...

Chertchom, Prajak, Tanimoto, Shigeaki, Konosu, Tsutomu, Iwashita, Motoi, Kobayashi, Toru, Sato, Hiroyuki, Kanai, Atsushi.  2019.  Data Management Portfolio for Improvement of Privacy in Fog-to-cloud...

View Article

Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT...

Xia, Qi, Sifah, Emmanuel Boateng, Obour Agyekum, Kwame Opuni-Boachie, Xia, Hu, Acheampong, Kingsley Nketia, Smahi, Abla, Gao, Jianbin, Du, Xiaojiang, Guizani, Mohsen.  2019.  Secured Fine-Grained...

View Article

On the Large-Scale Traffic DDoS Threat of Space Backbone Network

Di, A., Ruisheng, S., Lan, L., Yueming, L..  2019.  On the Large-Scale Traffic DDoS Threat of Space Backbone Network. 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE...

View Article


Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices...

Enkhtaivan, B., Inoue, A..  2020.  Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain. 2020 IEEE International Conference on Smart Internet of Things...

View Article


An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps

Fan, M., Yu, L., Chen, S., Zhou, H., Luo, X., Li, S., Liu, Y., Liu, J., Liu, T..  2020.  An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. 2020 IEEE 31st International...

View Article

Signature Image Hiding in Color Image using Steganography and Cryptography...

Pramanik, S., Bandyopadhyay, S. K., Ghosh, R..  2020.  Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts. 2020 2nd International Conference...

View Article

Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data...

Li, Y., Liu, Y., Wang, Y., Guo, Z., Yin, H., Teng, H..  2020.  Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking. IEEE INFOCOM 2020 - IEEE Conference on Computer...

View Article


A Secure Transmission Scheme Based on Efficient Transmission Fountain Code

Chai, L., Ren, P., Du, Q..  2020.  A Secure Transmission Scheme Based on Efficient Transmission Fountain Code. 2020 IEEE/CIC International Conference on Communications in China (ICCC). :600–604.

View Article

Privacy and Security of IoT based Skin Monitoring System using Blockchain...

Juyal, S., Sharma, S., Harbola, A., Shukla, A. S..  2020.  Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach. 2020 IEEE International Conference on Electronics,...

View Article

Research on Data Transmission Security Architecture Design and Process

Maalla, Allam.  2020.  Research on Data Transmission Security Architecture Design and Process. 2020 IEEE International Conference on Information Technology,Big Data and Artificial Intelligence (ICIBA)....

View Article

Image Encryption Using Chaotic Map And Related Analysis

Pradeep, Diya Achu, Harsha, A, Jacob, Jaison.  2021.  Image Encryption Using Chaotic Map And Related Analysis. 2021 International Conference on Advances in Computing and Communications (ICACC). :1—5.

View Article



MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social...

Naik, Badavath Shravan, Tripathy, Somanath, Mohanty, Susil Kumar.  2022.  MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle. GLOBECOM 2022 - 2022 IEEE Global...

View Article
Browsing latest articles
Browse All 41 View Live




Latest Images