ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Secure Data Transmission Method for Power 5G Edge Computing Scenarios
Mapping Intimacies
◽
10.1109/wcsp52459.2021.9613302
◽
2021
◽
Author(s):
Jiming Yao
◽
Wei Wang
◽
Peng Wu
◽
Ningzhe Xing
◽
Chun Yang
Keyword(s):
Data Transmission
◽
Edge Computing
◽
Transmission Method
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Related Documents
Cited By
References
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
◽
10.1109/iihmsp.2010.52
◽
2010
◽
Author(s):
Piotrowski Zbigniew
◽
Sawicki Krzysztof
◽
Bednarczyk Mariusz
◽
Gajewski Piotr
Keyword(s):
Ieee 802.11
◽
Data Transmission
◽
Transmission Method
◽
802.11 Networks
◽
Secure Data
◽
Ieee 802.11 Networks
◽
Secure Data Transmission
Download Full-text
Physical Layer Secure Data Transmission for Mobile Edge Computing: Beamforming and Artificial Noise
Journal of Physics Conference Series
◽
10.1088/1742-6596/1659/1/012016
◽
2020
◽
Vol 1659
◽
pp. 012016
Author(s):
Aidong Xu
◽
Jie Tang
◽
Yonggang Zeng
◽
Li Cheng Li
◽
Yixin Jiang
◽
...
Keyword(s):
Data Transmission
◽
Physical Layer
◽
Edge Computing
◽
Artificial Noise
◽
Mobile Edge Computing
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Cellular automata-based optimised routing for secure data transmission in wireless sensor networks
Journal of Experimental & Theoretical Artificial Intelligence
◽
10.1080/0952813x.2021.1882002
◽
2021
◽
pp. 1-19
Author(s):
Pradeep Sadashiv Khot
◽
Udaykumar Laxman Naik
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Cellular Automata
◽
Data Transmission
◽
Wireless Sensor
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
A Key Setup and a Secure Data Transmission Mechanism Based on Three-Dimensional Coordinates for Sensor Network Communication
2008 International Conference on Information Science and Security (ICISS 2008)
◽
10.1109/iciss.2008.26
◽
2008
◽
Cited By ~ 2
Author(s):
Inshil Doh
◽
Kijoon Chae
Keyword(s):
Sensor Network
◽
Data Transmission
◽
Three Dimensional
◽
Transmission Mechanism
◽
Network Communication
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Introducing secure data transmission scheme in a heterogeneous environment
2013 Third World Congress on Information and Communication Technologies (WICT 2013)
◽
10.1109/wict.2013.7113101
◽
2013
◽
Author(s):
Kun Liu
◽
Kun Ma
◽
Ajith Abraham
Keyword(s):
Data Transmission
◽
Heterogeneous Environment
◽
Transmission Scheme
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Machine Learning Based Data Security Model Using Blockchain for Secure Data Transmission in IoT
10.1109/icesc51422.2021.9532659
◽
2021
◽
Author(s):
Smitha Chowdary Ch
◽
Srilakshmi Puli
◽
Lakshmi Viveka K
◽
M.V.B.T. Santhi
Keyword(s):
Machine Learning
◽
Data Transmission
◽
Data Security
◽
Security Model
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
WSN-IoT Clustering for Secure Data Transmission in E-Health Sector using Green Computing Strategy
10.1109/citsm52892.2021.9588977
◽
2021
◽
Author(s):
Anurag Srivastava
◽
Abhishek Singh
◽
Susheel George Joseph
◽
M. Rajkumar
◽
Yogini Dilip Borole
◽
...
Keyword(s):
Data Transmission
◽
Health Sector
◽
Green Computing
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
Cluster Computing
◽
10.1007/s10586-017-1079-x
◽
2017
◽
Vol 22
(S5)
◽
pp. 10467-10479
◽
Cited By ~ 2
Author(s):
S. Beulah
◽
F. Ramesh Dhanaseelan
Keyword(s):
Big Data
◽
Data Transmission
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Two observer approaches for synchronization of chaotic Colpitts oscillators: application to secure data transmission
Proceedings of the 45th IEEE Conference on Decision and Control
◽
10.1109/cdc.2006.377734
◽
2006
◽
Author(s):
M. L'Hernault
◽
J. De Leon-Morales
◽
J. P. Barbot
◽
A. Ouslimani
Keyword(s):
Data Transmission
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Secure Data Transmission of Smart Home Networks Based on Information Hiding
Pattern Recognition and Artificial Intelligence - Lecture Notes in Computer Science
◽
10.1007/978-3-030-59830-3_23
◽
2020
◽
pp. 264-275
Author(s):
Haiyu Deng
◽
Lina Yang
◽
Xiaocui Dang
◽
Yuan Yan Tang
◽
Patrick Wang
Keyword(s):
Data Transmission
◽
Information Hiding
◽
Smart Home
◽
Home Networks
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close