Results 51 to 60 of about 144,734 (270)

Research on Telecommunication System Business Security Architecture

open access: yesDianxin kexue, 2013
The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile ...
Hong Li, Kai Qu
doaj   +2 more sources

Quantum protocol for decision making and verifying truthfulness among N‐quantum parties: Solution and extension of the quantum coin flipping game

open access: yesIET Quantum Communication, 2023
The authors devised a protocol that allows two parties, who may malfunction or intentionally convey incorrect information in communication through a quantum channel, to verify each other's measurements and agree on each other's results.
Kazuki Ikeda, Adam Lowe
doaj   +1 more source

Impacts of energy taxation in the enlarged European Union, evaluation with GEM-E3 Europe [PDF]

open access: yes, 2005
The objective of this study is twofold: first to analyze how the implementation of the EU energy tax policies will affect the EU and its Member States and secondly to analyze how energy tax policies can contribute to climate policy objectives in the ...
Kouvaritakis, Nikos   +5 more
core  

TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]

open access: yes, 2010
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core  

Proactive Robotic Grasp Stability via Tactile Safety Margin Feedback

open access: yesAdvanced Intelligent Systems, EarlyView.
We introduce the tactile safety margin (TSM), defined as the ratio between applied friction force (Ffric) and maximum friction (Fmax) derived from grip force. A bilayer E‐skin with decoupled temperature, strain, and pressure sensing enables real‐time grasp stability monitoring through measured TSM values, allowing robots to proactively adjust grip ...
Yebin Park   +10 more
wiley   +1 more source

Secure transmission for reconfigurable intelligent surface assisted communication with CV‐DDPG

open access: yesIET Communications, 2023
Reconfigurable intelligent surface (RIS) has great potential in securing wireless transmission, and it can flexibly change the wireless communication environment. However, the employment of RIS increases the difficulty in beamforming of base station (BS),
Ling Gao, Li Xu, Yuexin Zhang, Wei Lin
doaj   +1 more source

Business model requirements and challenges in the mobile telecommunication sector [PDF]

open access: yes, 2009
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization, and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted ...
Al-Debei, MM, Avison, D
core  

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

Metasurfaces and Metadevices for Topological Electromagnetic Waves

open access: yesAdvanced Physics Research, EarlyView.
Optical topologies refer to diverse topological localized structures made by diverse parameters of light fields, such as vortices, skyrmions, and hopfions. This article navigates a direction of metasurface‐based integrated devices for generation, manipulation and detection of novel topologies of light, which would be a rapidly growing interdisciplinary
Rensheng Xie   +3 more
wiley   +1 more source

METHOD'S REALIZATION PRINCIPLES OF INFORMATION PROTECTION MANAGEMENT SYSTEM AUDITING AT TELECOMMUNICATION COMPANIES

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The evaluation of the activity specifics of Belarus telecommunication companies is made. The realization principles of information protection systems auditing method in these companies is grounded with use of the evaluation results and the requirements ...
V. A. Boiprav, L. L. Utin
doaj  

Home - About - Disclaimer - Privacy