Facet browsing currently unavailable
Page 1 of 157 results
Sort by: relevance publication year
Application of Time-Frequency Analysis to Finite Duration Communication Signals PROCEEDINGS ARTICLE published October 2006 in MILCOM 2006 |
On secure multi-channel communication systems PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF radio channel PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
A secure covert communication model based on video steganography PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Price based bifurcation control for finite buffered slotted ALOHA protocol with finite users PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Strategies for time-based multi-path secure information disseminations in MANETs PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Plethysmogram-based secure inter-sensor communication in Body Area Networks PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Coverage Estimation for Secure Ultraviolet Communication PROCEEDINGS ARTICLE published 28 November 2022 in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) |
Providing secure interoperability while maintaining sovereignty PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Cross-layer Paradigms in the Convergence of computing, communication and control (C3) PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks? PROCEEDINGS ARTICLE published October 2018 in MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) |
Secure data retrieval system (SEDAR) for DTNs PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
On the architecture of secure software defined radios PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Long range real-time underwater acoustic communication at low bit rate with channel coding protection PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
A fully-distributed control time slot assignment protocol for large wireless mesh networks PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Secure communications over hybrid military networks PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Secure ATC surveillance for military applications PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
An Automatic Resynchronization Technique for Secure Communication with Stream Ciphers PROCEEDINGS ARTICLE published in MILCOM 2005 - 2005 IEEE Military Communications Conference |
Secure jam resistant key transfer: Using the DOD CAC card to secure a radio link by employing the BBC jam resistant algorithm PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |
Topology reconstruction via path recording in secure MANET PROCEEDINGS ARTICLE published November 2008 in MILCOM 2008 - 2008 IEEE Military Communications Conference |