Zobrazeno 1 - 10
of 132
pro vyhledávání: '"trusted path"'
Publikováno v:
Journal of Information and Telecommunication, Vol 8, Iss 4, Pp 417-451 (2024)
This paper introduces iTEVAC, an advanced model of the Trusted Evacuation System (TEVAC), designed to optimize emergency evacuation procedures within commercial centers. Building upon the principles of TEVAC, iTEVAC incorporates additional features s
Externí odkaz:
https://doaj.org/article/ce026313a601482e9520ce9e4e8b9489
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5232 (2023)
Malware often attempts to steal input and output through human interface devices to obtain confidential information. We propose to use a thin hypervisor, called “HyperIO”, to realize a secure path between input and output devices using a partial
Externí odkaz:
https://doaj.org/article/793e2718388a4372b934ef074fb3d535
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
网络与信息安全学报, Vol 3, Pp 39-50 (2017)
Based on SWTrust architecture,using complex weighted network to establish research cooperation network model,the researchers who has co-authored papers in the chinese science citation database were studied,the scale,law and other characteristics of t
Externí odkaz:
https://doaj.org/article/792ce5b37dfb4aadbcc0257cda89719e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Prathapchandran Kannimuthu
Publikováno v:
International Journal of Interdisciplinary Telecommunications and Networking. 13:51-71
In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the
Autor:
K. Thamizhmaran
Publikováno v:
Journal of VLSI Design and Signal Processing. 6:18-21
Nowadays, of emerging research field of base station less network (type of ad-hoc network) Mobile Ad hoc Network (MANET. All the developed research work of protocols fixed number of nodes in the network, and also challenges of MANET energy and securi
Autor:
S.R. Liyanage, G. M. Jinarajadasa
Publikováno v:
Inventive Computation and Information Technologies ISBN: 9789813343047
Mobile ad hoc network (MANETs) is one of the most popular wireless networks which is having dynamic topologies due to their self-organizing nature. These are less infrastructure-oriented networks due to nodes being mobile, and hence routing becomes a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::224bee5e2fccea0dc89fcf54ec3b7144
https://doi.org/10.1007/978-981-33-4305-4_52
https://doi.org/10.1007/978-981-33-4305-4_52
Publikováno v:
ISCC
A trusted network path is a desired property of the Internet. Previous works introduced new protocol headers based on source routing for source authentication and path verification. It is obvious that any extra protocol headers will increase the netw