TITLE

Encrypt Naval Communications with Merchant Ships

AUTHOR(S)
Sluiman, F. J.
PUB. DATE
December 2010
SOURCE
U.S. Naval Institute Proceedings;Dec2010, Vol. 136 Issue 12, p76
SOURCE TYPE
Conference Proceeding
DOC. TYPE
Article
ABSTRACT
The article focuses on the growing threat of unauthorized disclosure of communication methods between naval authorities and merchant ships. According to the author, wireless communicate method to merchant ships do not always provide protection against unauthorized disclosure. Concerns are expressed over several decoding software that are available in the Internet for the digital satellite communication system Inmarsat C that can be easily accesed by anybody.
ACCESSION #
56518318

 

Related Articles

  • Untitled. Ashford, Warwick // Computer Weekly;6/22/2010, p26 

    The article reports on the adoption of full disc encryption and media encryption systems by the Great Britain's government funded agency Business Link Northwest. It is reported that, Business Link has taken the step to bring its security in line with the policies of the government's Northwest...

  • A Fast and Secure Selective Encryption Scheme using Grid Division Method. Agrawal, Priyanka; Rajpoot, Manisha // International Journal of Computer Applications;8/1/2012, Vol. 51, p29 

    Encryption is the primary solution to provide security to the data, which is travelling on a communication link between any pair of nodes, but Selective encryption is a technique to save computational power, overhead, speed, time and to provide quick security by only encrypting a selected...

  • An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication. Panse, Trishna; Kapoor, V. // International Journal of Computer Applications;7/15/2012, Vol. 50, p45 

    Data security is an important issue in data transmission through any type of network whether it is LAN, WAN, MAN or PAN. We are concentrating on PAN that is personal area network. Bluetooth is an example of this type of network. To provide the security in Bluetooth communication currently used...

  • Security Improvement by using Dual Coded FHSS (DC-FHSS). Ullah, Rahat; Ali, Amjad; Latif, Shahid // International Journal of Computer Applications;Aug2013, Vol. 76 Issue 1-16, p1 

    In this paper a technique is offered for improving the security of data transmission. In today's technical world the prime objective of wireless communication is to make the transmission not only clear, noise free and time efficient but also to make it well secure from unauthorized interceptors....

  • Secured Wireless Data Communication. Hire, Dnyanda Namdeo // International Journal of Computer Applications;09/15/2012, Vol. 54, p27 

    Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of...

  • Gotcha Moments. Smith, Kenneth M. // Information Security;Apr2008, Vol. 11 Issue 3, p10 

    In this article, the author looks at common misconceptions about information security that lead to breaches and bad publicity. The author begins with the misconception that encryption is a security guarantee. He then explains the misconception that enabling the wireless authentication and...

  • Attack and Analysis on The Vulnerability of Tenda Wireless Routers. Yipeng Zhang; Zhengtao Jiang; Chen Yang // Applied Mechanics & Materials;2014, Issue 556-562, p5316 

    Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and...

  • Products.  // RCR Wireless News;1/3/2005, Vol. 24 Issue 1, p17 

    Evaluates several wireless communication systems. VersaMail 2.7 wireless e-mail software from PalmOne Inc.; Datex Systems' PicsPhones v. 1.3 Windows application program which enhances photographs; Earpieces for Nextel phones from Klein Electronics Inc.; Mobile Enterprise technology that...

  • Better Performances of RC4 Ciphering Using New Algorithm. Kassem, Hussam; Saber, Hamad // Australian Journal of Basic & Applied Sciences;2011, Vol. 5 Issue 4, p127 

    This paper develops a new algorithm to improve the security of RC4. Given that RC4 cipher is widely used in the wireless communication and has some weaknesses in the security of RC4 cipher, our idea is based on the combination of the RC4 and the poly alphabetic cipher Vigenère to give a new...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics