Showing 721 - 740 results of 1,461 for search '"Telecommunications"', query time: 0.04s Refine Results
  1. 721
  2. 722
  3. 723
  4. 724
  5. 725
  6. 726

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
    Get full text
    Article
  7. 727

    Research of WLAN authentication in roaming environment with the trend of network integration by Zhang-zhe LIU, Hua-ying SHU

    Published 2012-09-01
    “…In the tendency of network convergence,the method of WLAN network client authentication based on telecommunications network will be the main way of WLAN authentication in the future.In order to make WLAN authentication efficiency and security under roaming condition,WLAN authentication requirements were analyzed,the authentication mode,the process and the existing problems were discussed.An application model and design scheme of WLAN network client authentication based on EAP SIM/AKA protocol with the trend of network integration were proposed and verified.Experimental results show that this application model can complete the EAP SIM/AKA protocol identification of a WLAN client in roaming process,reduce the investment of networks,keep the safety grades of the nodes in the visited WLAN with the initial safety grades,and realize the real-time charging.…”
    Get full text
    Article
  8. 728
  9. 729
  10. 730
  11. 731
  12. 732

    Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security by Xiaoyin XI, Xiaoyun YUAN

    Published 2020-11-01
    “…In order to better promote the construction of China Telecom’s network and information security governance system,optimize the network and information security product service system,and promote the cultivation and development of network and information security core competence,domestic and foreign industry benchmark enterprises were selected to carry out practical case analysis.The advanced successful experience of benchmarking enterprises in the field of network and information security were summarized,and the current development status and future development trend in the field of network and information security were further combined,and targeted development suggestions and measures were put forward to improve the governance system of China’s telecommunications network and information security,improve the governance ability,as well as related business,and the development of products and services provides useful help.…”
    Get full text
    Article
  13. 733
  14. 734

    A comparative analysis of the development modes of the IoT for telecom operators by Kaikai LIU, Xun ZHANG

    Published 2019-09-01
    “…In recent years,the development of IoT is in full swing.It is of great significance for the current transformation and development of domestic telecom operators.In this context,the business model is very important for operators to achieve “overtaking” in the IoT industry.Based on the analysis of the operation status of the IoT of operators,the development strategies of the IoT industry at home and abroad were compared,and three different development strategies was summarized.Telecom operators had advantages in customers,channels and other aspects,but limited by many factors.It was suggested that in constructing the development model,they should follow the principle of gradual progress,fully according to their own enterprise positioning,combined with national policies,pay attention to their own positioning in the industry chain of the IoT,pay attention to risks,and ultimately realize it.Better development model improve the current situation of increasing revenue in the telecommunications industry.…”
    Get full text
    Article
  15. 735
  16. 736
  17. 737
  18. 738
  19. 739
  20. 740