Confidentiality

View this topic in
Confidentiality is an ethical principle associated with several professions (e.g. , medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties. (Wikipedia.org)






Conferences related to Confidentiality

Back to Top

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 15th International Symposium on Wireless Communication Systems (ISWCS)

The aim of this symposium is to provide a forum for researchers and technologists to present new ideas and contributions in the form of technical papers, panel discussions, as well as real-world evaluation in the field of wireless communications, networking and signal processing.The symposium will bring together various wireless communication systems developers to discuss the current status, technical challenges, standards, fundamental issues, and future services and applications.

  • 2017 International Symposium on Wireless Communication Systems (ISWCS)

    This event will bring together experts from various research and industry fields of wireless communications, as well as representatives of standardization and regulatory bodies. In that context we foresee focusing on highly-innovative and state-of-the-art contributions in the form of original technical papers, demos or products and achievements shown at the accompanying exhibition.

  • 2016 International Symposium on Wireless Communication Systems (ISWCS)

    The Thirteen International Symposium on Wireless Communication Systems (ISWCS’16) will follow the over ten-year long traditionof that event which will bring together experts from various research and industry fields of wireless communications, as well as representatives of standardization and regulatory bodies. In that context we foresee focusing on highly-innovative and state-of-the-art contributions in the form of original technical papers, demos or products and achievements shown at the accompanying exhibition.

  • 2015 International Symposium on Wireless Communication Systems

    The aim of this symposium is to provide a forum for researchers and technologists to present new ideas and contributions in the form of technical papers, panel discussions as well as real-world evaluation of many ideas in wireless communications, networking and signal processing. This twelfth edition of the symposium will bring together various wireless communication systems developers to discuss the current status, technical challenges, standards, fundamental issues, and future services and applications. ISWCS’15 seeks to address and capture highly-innovative and state-of-the-art research from academia and the wireless industry, as well as standardization advances. The scope of the conference includes a wide range of technical challenges encompassing wireless communications, information theory, quality of service support, networking, signal processing, cross-layer design for improved performance, and future wireless broadband systems.

  • 2014 11th International Symposium on Wireless Communications Systems (ISWCS)

    Wireless communications are at the heart of a new field characterized by smart and flexible transceiver concepts, the convergence of systems and technologies, and the development of technologies with a user-centric focus. In this context, the objective of the ISWCS'2014 is to provide a recognized and dynamic forum for researchers and engineers from academia and industry to present and to discuss original ideas and contributions in all fields related to mobile wireless communication systems, and to capture highly-innovative and state-of-the-art research from academia, the wireless industry as well as standardization advances, and to present novel contributions in the form of tutorials, panel discussions, keynote speeches, technical papers, and posters. The scope of the conference includes a wide range of technical challenges encompassing wireless communications and networking, quality of service, signal processing, cross layer design, broadband access, and cooperative communication.

  • 2013 Tenth International Symposium on Wireless Communications Systems (ISWCS)

    wireless communications systems

  • 2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012)

    The scope of the conference includes wireless communications, quality of service support, wireless networking, signal processing, cross layer air interface design and wireless broadband access.

  • 2011 8th International Symposium on Wireless Communication Systems (ISWCS 2011)

    ISWCS'11 seeks to address and capture highly innovative and state-of-the-art research from academia, the wireless industry and standardization bodies. The scope of the conference includes technical challenges encompassing wireless communications, quality of service support, wireless networking, signal processing, cross-layer air interface design, wireless broadband access and cooperative communication.

  • 2010 7th International Symposium on Wireless Communication Systems (ISWCS 2010)

    wireless and mobile communications, signal processing, networking, cognitive radio.

  • 2009 6th International Symposium on Wireless Communication Systems (ISWCS 2009)

    ISWCS 09 seeks to address highly-innovative research as well as wireless industry and standardization bodies contributions. The scope of the conference includes a wide range of technical challenges encompassing wireless communications and networking, quality of service support, cross-layer air interface design for improved performance, wireless broadband access, and cooperative networking.

  • 2008 IEEE International Symposium on Wireless Communication Systems (ISWCS 2008)

    Wireless communications is at the centre of a new and passionate era for telecommunications. The IEEE International Symposium on Wireless Communication Systems (ISWCS) positions itself as a recognised and dynamic forum for researchers and technologists to present and discuss original ideas in all fields related to wireless communication systems.

  • 2007 IEEE International Symposium on Wireless Communication Systems (ISWCS 2007)

    Identify and discuss the future technical challenges and business opportunities arising in the path towards the realization of ambient wireless communication networks. Together with the technical sessions, the symposium will feature tutorials and keynote presentations from leading wireless communication experts from industry, academia and regulatory and standardization bodies.

  • 2006 3rd International Symposium on Wireless Communication Systems (ISWCS 2006)

  • 2005 2nd International Symposium on Wireless Communication Systems (ISWCS 2005)

  • 2004 1st International Symposium on Wireless Communication Systems (ISWCS 2004)


2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)

Cluster Computing, Grid Computing, Edge Computing, Cloud Computing, Parallel Computing, Distributed Computing


2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

The Ninth International Conference on Computing, Communication and Networking Technologies (9th ICCCNT 2018) aims to provide a forum that brings together International researchers from academia and practitioners in the industry to meet and exchange ideas and recent research work on all aspects of Information and Communication Technologies. Following the great success of ICCCNT’08, ICCCNT’10, ICCCNT’12, ICCCNT'13, ICCCNT'14 , ICCCNT'15,ICCCNT'16 and ICCCNT'17. The ninth edition of the event, ICCCNT’17, will be held in IISc, Bangalore on July 10-12, 2018. The conference will consist of keynote speeches, technical sessions, and exhibition. The technical sessions will present original and fundamental research advances, and the workshops will focus on hot topics in Information and Communication Engineering. Experts from NASA, MIT, Japan will give key note speeches

  • 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

    (ICCCNT) aims to provide a forum that brings together International researchers from academia and practitioners in the industry to meet and exchange ideas and recent research work on all aspects of Information and Communication Technologies.

  • 2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

    The Sixth International Conference on Computing, Communications and Networking Technologies (ICCCNT) aims to provide a forum that brings together International researchers from academia and practitioners in the industry to meet and exchange ideas and recent research work on all aspects of Information and Communication Technologies

  • 2014 5th International Conference on Computing Communication and Networking Technologies (ICCCNT)

    The Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) aims to provide a forum that brings together International researchers from academia and practitioners in the industry to meet and exchange ideas and recent research work on all aspects of Information and Communication Technologies

  • 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

    The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography

  • 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)

    The purpose of ICCCNT 2012 is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision, extensive experience and knowledge gained through modeling, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international level.

  • 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10)

    The second International Conference on Computing, Communication and Networking Technologies (ICCCNT 10) will be held at the Chettinad College of Engineering and Technology (CCET), Karur (DT), TamilNadu, India from July 29th to 31st 2010. The CCET is promoted by a reputed 75 year old Group of Educational Institutions Chettinad House . The purpose of ICCCNT 10, is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key


More Conferences

Periodicals related to Confidentiality

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Electromagnetic Compatibility, IEEE Transactions on

EMC standards; measurement technology; undesired sources; cable/grounding; filters/shielding; equipment EMC; systems EMC; antennas and propagation; spectrum utilization; electromagnetic pulses; lightning; radiation hazards; and Walsh functions


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Confidentiality

Back to Top

Xplore Articles related to Confidentiality

Back to Top

Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018)

[{u'author_order': 1, u'full_name': u'Layth Sliman'}, {u'author_order': 2, u'full_name': u'Hachemi Nabil Dellys'}] 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), None

Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT) is a track of the 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2018). SSCIoT aims to present mature research results or work-in- progress in all areas focuses security in IoT architecture based on business process, Business Analytics, Data fusion, Physical infrastructures of information systems and other ...


Cryptographic Method to Provide Confidentiality and Integrity in Implantable Medical Devices

[{u'author_order': 1, u'affiliation': u'Computer Science and Engineering, Vidya Academy of Science and Technology, Thalakottukara P.O., Thrissur, Kerala, 680501, India', u'full_name': u'T H Vishnupriya'}, {u'author_order': 2, u'affiliation': u'Computer Science and Engineering, Vidya Academy of Science and Technology, Thalakottukara P.O., Thrissur, Kerala, 680501, India', u'full_name': u'Jucy Vareed'}] 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), None

This paper presents various cryptographic mechanisms used to bring confidentiality and integrity to Implantable Medical Devices(IMDs) that are wirelessly connected. An IMD is described as any operating medical device that is designed to be completely or partly brought in, surgically or medically, into the human body or by medical intervention into a natural opening, and which is destined to persist ...


A Technique to Resolve Data Integrity and Confidentiality Issues in a Wireless Sensor Network

[{u'author_order': 1, u'affiliation': u'I. K. Gujral Punjab Technical University, Kapurthala, Punjab, INDIA', u'full_name': u'Sunil Kumar'}, {u'author_order': 2, u'affiliation': u'NITTTR, Department of Computer Science and Engineering, Chandigarh, INDIA', u'full_name': u'C. Rama Krishna'}, {u'author_order': 3, u'affiliation': u'NITTTR, Department of Computer Science and Engineering, Chandigarh, INDIA', u'full_name': u'A. K. Solanki'}] 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), None

Security in WSN infrastructure is the ability to transmit electronic data from source to destination so that only intended recipients can receive the actual data without compromising its integrity and losing its confidentiality throughout the entire transmission process. The use of standard public or private key cryptographic techniques can solve various confidentiality issues such as they can prevent various security ...


Applying Deep Learning to Preserve Data Confidentiality Keynote Address

[{u'author_order': 1, u'affiliation': u'Software Engineering Wuhan University, China', u'full_name': u'Xiaohi Cui'}] 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), None

Provides an abstract of the keynote presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.


Atlas: Application Confidentiality in Compromised Embedded Systems

[{u'author_order': 1, u'affiliation': u'ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: pieter.maene@esat.kuleuven.be)', u'full_name': u'Pieter Maene'}, {u'author_order': 2, u'affiliation': u'Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: johannes.goetzfried@cs.fau.de)', u'full_name': u'Johannes Gotzfried'}, {u'author_order': 3, u'affiliation': u'Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: tilo.mueller@cs.fau.de)', u'full_name': u'Tilo Muller'}, {u'author_order': 4, u'affiliation': u'ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: ruan.declercq@esat.kuleuven.be)', u'full_name': u'Ruan de Clercq'}, {u'author_order': 5, u'affiliation': u'Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: felix.freiling@cs.fau.de)', u'full_name': u'Felix Freiling'}, {u'author_order': 6, u'affiliation': u'ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: Ingrid.Verbauwhede@esat.kuleuven.be)', u'full_name': u'Ingrid Verbauwhede'}] IEEE Transactions on Dependable and Secure Computing, None

Due to the requirements of the Internet-of-Things, modern embedded systems have become increasingly complex, running different applications. In order to protect their intellectual property as well as the confidentiality of sensitive data they process, these applications have to be isolated from each other. Traditional memory protection and memory management units provide such isolation, but rely on operating system support for ...


More Xplore Articles

Educational Resources on Confidentiality

Back to Top

eLearning

No eLearning Articles are currently tagged "Confidentiality"

IEEE-USA E-Books

  • Security Basics for Computer Architects

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-awar computer architectures.

  • Security Schemes for Smart Grid Communications over Public Networks

    This chapter focuses on security schemes for smart grid communications over public networks that utility companies subscribe to. The proposed security schemes can be applied by utilities even without full control of the communications network to add extra protection on top of existing security provided by network service providers. The chapter proposes an identity (ID)‐based security scheme to achieve digital signature and encryption simultaneously; thus the proposed scheme is also named as ID‐based signcryption (IBSC). The proposed IBSC scheme was reduced to an ID‐based digital signature scheme if confidentiality is not required for some messages. Performance of the proposed schemes is evaluated based on the number of operations and the efficiency of each type of operations. Delegation of signing rights from one local control center to another local control center was achieved by the proposed identity‐based schemes.

  • Security Schemes for AMI Private Networks

    This chapter proposes a security protocol specifically for the advanced metering infrastructure (AMI) in the smart grid to address the security requirements. In order to meet various security requirements for asymmetric communication in the AMI, the proposed security protocol consists of initial authentication scheme, independent security schemes for uplink and downlink transmissions, and a domain secret update scheme. The security scheme for uplink transmissions provides confidentiality and data integrity to metering data and other monitoring data. The security scheme for downlink transmissions provides data integrity and non‐repudiation for controlling data and pricing/tariff information. The proposed security schemes in the chapter are based on several network security concepts: security services and security mechanisms. In order to keep the AMI secure in the long run, domain secrets need to be refreshed frequently, for example, daily or hourly depending on requirements.

  • Information Theoretic Security

    Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. Attacks on the security of communication networks can be divided into two basic types: passive attacks and active attacks. An active attack corresponds to the situation in which a malicious actor intentionally disrupts the system. A passive attack corresponds to the situation in which a malicious actor attempts to interpret source information without injecting any information or trying to modify the information; i.e., passive attackers listen to the transmission without modifying it. Information Theoretic Security focuses on confidentiality issues, in which passive attacks are of primary concern. The information theoretic approach to achieving secure communication opens a promising new direction toward solving wireless networking security problems. Compared to contemporary cryptosystems, information th oretic approaches offer advantages such as eliminating the key management issue; are less vulnerable to the man-in-the-middle and achieve provable security that is robust to powerful eavesdroppers possessing unlimited computational resources, knowledge of the communication strategy employed including coding and decoding algorithms, and access to communication systems either through perfect or noisy channels. Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems. It proceeds to provide an overview of how information theoretic approaches are developed to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks. It is an invaluable resource for students and researchers working in network security, information theory and communications.

  • Principles and Implementation Techniques of Software-Based Fault Isolation

    When protecting a computer system, it is often necessary to isolate an untrusted component into a separate protection domain and provide only controlled interaction between the domain and the rest of the system. Software-based Fault Isolation (SFI) establishes a logical protection domain by inserting dynamic checks before memory and control-transfer instructions. Compared to other isolation mechanisms, it enjoys the benefits of high efficiency (with less than 5% performance overhead), being readily applicable to legacy native code, and not relying on special hardware or OS support. SFI has been successfully applied in many applications, including isolating OS kernel extensions, isolating plug-ins in browsers, and isolating native libraries in the Java Virtual Machine. This monograph discusses the SFI policy, its main implementation and optimization techniques, as well as an SFI formalization on an idealized assembly language. It concludes with a brief discussion on future research dir ctions and a look at other properties that provide strong integrity and confidentiality guarantees on software systems.

  • Network Security and Privacy for Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy‐preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy‐preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud‐based environments.

  • Key Management in CPSs

    Many cyber‐physical systems (CPSs) are life‐critical systems. Thus, their security is important. A CPS includes both computation and networking components, which are vulnerable to threats and attacks such as eavesdropping and injection attacks. To prevent these attacks, security services such as confidentiality, authentication, integrity, and nonrepudiation are desired. All these security services require corresponding keys established between communication entities that exchange data. However, due to the unique characteristics of CPSs such as heterogeneity, real‐time availability, resilience to attacks, interoperability, and survivability, key management is a challenging issue. This chapter discusses key management issues in CPSs in depth, including, but are not limited to, CPS security goals, threats and attacks, key management design principles, comparison of different key management techniques, key management challenges, and open research issues.

  • Security and Privacy Issues in the Internet of Cows

    This chapter discusses some of the potential security and privacy risks involved when Internet of Things (IoT) devices and cyber‐physical systems (CPSs) are used to manage livestock. IoT‐enabled technologies give the farmer the ability to track the location, exposure, medication, feeds, and diseases of each individual animal over its lifetime and to trace problems from fork back to farm. The chapter also discusses how it is important for dairymen to balance their cattle's intake of high‐fiber and high‐energy feeds to maintain the health of the animal while maximizing milk production. The base set of security concepts includes the following: data confidentiality, data integrity, system availability and system safety. The chapter offers two types of recommendations to enhance security and privacy of CPSs in agriculture: technical considerations for CPSs and IoT developers during the architecture and design phases of product development; and policy and operational considerations for farmers, their partner organizations, researchers, and regulatory authorities.

  • Security

    This chapter discusses authentication protocols for network security. It also covers principles of key distribution, followed up by some specific solutions in ad hoc networks and sensor networks. Two‐party authentication protocols, and public key cryptography are used in many networks. With a public key cryptographic system, each party only has to know and verify the public key of the other party. Cryptographic authentication consists of challenging the user or communicating party being authenticated to prove its identity by demonstrating ability to encipher or decipher some item with a secret or private key known to be stored inside the smart card. Cryptography provides only two fundamental services, namely, confidentiality and authentication. Cryptography allows users to be identified by allocating secret keys to them. There are three components that make up security architecture: users, trusted users, and secure channels which may provide confidentiality, authentication, or both.

  • Health Information Technology: Challenges in Ethics, Science, and Uncertainty

    This chapter contains sections titled: Privacy and Confidentiality Clinical Decision Support Systems Personal Health Records Conclusion References



Standards related to Confidentiality

Back to Top

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications

The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY) specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.



Jobs related to Confidentiality

Back to Top