Enhancement of KASUMI algorithm by adding hamming code

NH Jawad, LF Katran, BJ Abdulkareem… - AIP Conference …, 2024 - pubs.aip.org
Security is the most important part of wireless communication Security algorithms has been
utilized to protect our data. In this research, KASUMI algorithm is presented with Hamming …

Perancangan dan Penerapan Algoritme 4DES (Studi Kasus Pada Keamanan Berkas Rekam Medis)

Y Yanti, TY Arif, R Munadi - Jurnal Rekayasa Elektrika, 2016 - jurnal.usk.ac.id
Abstract Information is necessary for life because everything can not be done properly in the
absence of information. The security problem is one of the most crucial aspects of a file …

Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

X Wang - 2014 - ros.hw.ac.uk
With the fast development of communication systems, network security issues have more
and more impact on daily life. It is essential to construct a high degree of optical layer …

Optimising multiple antenna techniques for physical layer security

LN Romero Zurita - 2014 - etheses.whiterose.ac.uk
Wireless communications offer data transmission services anywhere and anytime, but with
the inevitable cost of introducing major security vulnerabilities. Indeed, an eavesdropper can …

[PDF][PDF] A ROBUST APPROACH FOR SECURING LTE SYSTEM TRANSMISSION USING KEY SECURITY

L Kaur, C Kaur - ijtra.com
The new cellular technology 4G LTE has been attracting several novel users. However, the
communications amongst applications, system transfer rule the radio level still stay new. In …

[引用][C] Security Survey and Study of DDos Attack on LTE (4G) Network

L Kaur, C Kaur