Filters








973,824 Hits in 4.4 sec

Application of Data Encryption Technology in Computer Network Information Security

Lifeng Li, C. Venkatesan
2022 Security and Communication Networks  
The network information security model on the basis of data encryption was built on the public key cryptosystem in the research.  ...  In the research, the application of data encryption in network information security system was mainly investigated, using RSA as the representative algorithm in the public key cryptosystem.  ...  Now, TCP/IP protocol is used in all the communication on the Internet network.  ... 
doi:10.1155/2022/7472205 fatcat:tm7owepr55ejlh7d2wl7rgpfni

Secure Routing in Wireless Sensor Networks [chapter]

Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas
2010 Handbook of Information and Communication Security  
In the past years we have seen that routing and transmission of data is not secure so we proposed certain technique and protocols to route data securely.  ...  network lifetime and provide all network security goals to protect the data that gives a better routing efficiency and data delivery.  ...  Working of this protocol : 1.)Cluster Head and sensor nodes will communicate via pair wise key that has no communication cost or expense. 2.)CH and its nodes will then generate a joined request, which  ... 
doi:10.1007/978-3-642-04117-4_27 fatcat:obpv6j6y6fcyhgqlwb2acxgapy

Multiple Secret Keys based Security for Wireless Sensor Networks

V. Thiruppathy Kesavan, S. Radhakrishnan
2012 International Journal of Communication Networks and Information Security  
Our simulation results shows that our security mechanism efficiently controls various attacks with lower resource requirements and the network resilience against node capture is substantially improved.  ...  We propose a security approach that uses secret key cryptography and key management along with re-keying support.  ...  Networks and Information Security (IJCNIS) Vol. 4, No. 1, April 2012  ... 
dblp:journals/ijcnis/KesavanR12 fatcat:5qx7cv46ijc5rjuwtqkzuoxcmi

Asynchronous Networks and Erlang Formulas

Erik Chromý, Matej Kavacký
2010 International Journal of Communication Networks and Information Security  
The paper addresses the idea of utilization of Erlang formulas in asynchronous ATM and IP networks.  ...  Based on the common properties of synchronous and asynchronous networks we have proposed the utilization of Erlang formulas not only for synchronous networks, but also for asynchronous networks.  ...  of N Bandwidth channels [Mbit/s] (links) International Journal of Communication Networks and Information Security (IJCNIS) Vol. 2, No. 2, August 2010  ... 
dblp:journals/ijcnis/ChromyK10 fatcat:4juz3ndnyzcpxbudaq36ig4sqy

Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network

Adnan Shahid Khan
2014 International Journal of Communication Networks and Information Security  
In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks.  ...  However, in RMRA, the rekeying is carried out after a specific interval of time, which cannot ensure the security for multicast communication on joining the member.  ...  Journal of Communication Networks and Information Security (IJCNIS) Vol. 6, No. 3, December 2014  ... 
dblp:journals/ijcnis/Khan14 fatcat:y3zchg2uqfd2lljiqsruo3kl64

Data and Information Security Technology in Network Communication

Mengqi Li
2020 Journal of Networking and Telecommunications  
The application of this technology can obviously enhance the security of network communication.  ...  This article discusses the significance and insecurity of network information security, and puts forward some measures for protecting data and information security for the reference.</p>  ...  Then, the security of link layer information in network system can be guaranteed.  ... 
doi:10.18282/jnt.v2i2.1102 fatcat:qnpmzxltrnd47ar47recmig2ay

Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks

Gicheol Wang, Gihwan Cho
2014 International Journal of Communication Networks and Information Security  
In wireless sensor networks, clustering plays a very important role for energy savings at each node because it reduces the number of transmissions through TDMA based communication.  ...  We prove that our scheme generates fewer clusters and is more secure and energy-efficient than its rival scheme through security analysis and simulation results.  ...  a definite evidence is found International Journal of Communication Networks and Information Security (IJCNIS) Vol. 6, No. 1, April 2014 International Journal of Communication Networks and Information  ... 
dblp:journals/ijcnis/WangC14 fatcat:uxejkpfzsbgnjkx5xoxokuqjfe

A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks

Jaydip Sen
2012 International Journal of Communication Networks and Information Security  
the privacy of the users and data in the network.  ...  File sharing peer-to-peer networks have become quite popular of late as a new paradigm for information exchange among large number of users in the Internet.  ...  The proposed searching algorithm The network learns trust information through the search and updates trust information and adapts topology based on the outcome of the search.  ... 
dblp:journals/ijcnis/Sen12 fatcat:igiaba4rzjg6jc3frli5ju4wym

Optimization of Regional Logistics Distribution Information Network Platform

Honglin Yan, C. Venkatesan
2022 Security and Communication Networks  
In order to solve the problem of regional logistics distribution, a study on the optimization of regional logistics distribution information network platform is proposed.  ...  Firstly, in order to meet the development requirements of regional logistics and improve customer satisfaction, the regional logistics path is optimized to solve the problem of long time consumption for  ...  Acknowledgments is study was supported by the fund project Research on Document and Certificate Financing Mode Based on "1+X" Certificate System (No. 2020-YJXM-001).  ... 
doi:10.1155/2022/6729247 fatcat:qmmhflk7o5bq7fsskgzsfthe2e

Cyber Security Concerns in Social Networking Service

Abdul Hamid, Monsur Alam, Hafsina Sheherin, Al-Sakib Khan Pathan
2022 International Journal of Communication Networks and Information Security  
Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media.  ...  Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons.  ...  International Journal of Communication Networks and Information Security (IJCNIS)Vol. 12, No. 2, August 2020  ... 
doi:10.17762/ijcnis.v12i2.4634 fatcat:eiifstsra5gm5d45t7zygevvke

Physical Layer Security for Wireless Networks Based on Coset Convolutional Coding

Michael Ekonde Sone
2020 International Journal of Communication Networks and Information Security  
The paper establishes a method to determine wireless channel parameters for secure communication.  ...  This paper presents a new physical layer security for wireless networks using non-linear convolutional cryptosystem.  ...  Communication Networks and Information Security (IJCNIS)Vol. 12, No. 1, April 2020  ... 
dblp:journals/ijcnis/Sone20 fatcat:2g47a5adkjaqxkxs5bbxa3lkmy

Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet

Selvi E, Shashidhara M. S
2017 International Journal of Communication Networks and Information Security  
A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network.  ...  Also, the enhanced Dynamic Source Routing (DSR) protocol is applied in QPSEC-DS technique is implemented to improve the energy management and secured data communication between the source and destination  ...  13.9 36 11.8 14.6 17.2 45 13 16.4 19.3 54 17.7 20.7 23.8 63 20.8 23.7 26.7 72 23.3 26.6 29.4 81 24.2 27.8 30.5 90 30.1 33.4 35.9 International Journal of Communication Networks and Information Security  ... 
dblp:journals/ijcnis/ES17 fatcat:6mwrwmyofrdrji6owr5lmlazjy

IoT Security Evolution: Challenges and Countermeasures Review

Ali M. A. Abuagoub
2022 International Journal of Communication Networks and Information Security  
Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers.  ...  Thus, it outlines the IoT security challenges as a future roadmap of research for new researchers in this domain.  ...  Acknowledgement This research work was supported by the Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University.  ... 
doi:10.17762/ijcnis.v11i3.4272 fatcat:jtjbomelvbbybp4jc3yr4rug3q

Design for 5G Mobile Network Architecture

Aleksandar Tudzarov, Toni Janevski
2011 International Journal of Communication Networks and Information Security  
For the process of performance measurements we introduce the QoSPRO procedure for control information exchange between the mobile terminal and the Policy Router.  ...  In this paper we propose a new design solution for network architecture of future 5G mobile networks.  ...  RTP / RTCP-based diagram for performance measurements International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3, No. 2, August 2011  ... 
dblp:journals/ijcnis/TudzarovJ11 fatcat:gzsq47lfvbfbngglhb7vqom6uu

The Security of Information in Financial Transactions via Mobile: Algorithms

2013 International journal of computer networks and communications security  
It is due to account information which exchanged including account number, password, credit accounts, etc. and the disclosure of this information will cause a lot of financial and moral losses.  ...  Today, mobile commerce or m-commerce has been considered by many companies, business, and organizations. In mobile commerce, information security of financial transactions is very important.  ...  Most of these data are included personal communication and information which should be handled in a secure encrypted form.  ... 
doi:10.47277/ijcncs/1(6)7 fatcat:ntrcm4rttbcvbilt2fn7xvwugq
« Previous Showing results 1 — 15 out of 973,824 results