2020
DOI: 10.1007/s10772-019-09607-8
|View full text |Cite
|
Sign up to set email alerts
|

Efficient signal and protocol level security for network communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 21 publications
0
1
0
Order By: Relevance
“…The design of multimedia resources contains three parts: audio, video, and 3D model. Audio is an important component, and this topic selects the intelligent voice generated by reading aloud female in the processing of voice and plays the voice by scanning the text to enhance the user's memory of the text; integrates video elements and plays the promotional video of the property by scanning the graphics of the property, which has more visual impact relative to the image; and produces a realistic virtual 3D model, so that the user can view house models and indoor roaming without leaving home [17]. Through these multimedia resources, the user can interact with the computer in real-time, which is a new model of human-computer interaction.…”
Section: Imagementioning
confidence: 99%
“…The design of multimedia resources contains three parts: audio, video, and 3D model. Audio is an important component, and this topic selects the intelligent voice generated by reading aloud female in the processing of voice and plays the voice by scanning the text to enhance the user's memory of the text; integrates video elements and plays the promotional video of the property by scanning the graphics of the property, which has more visual impact relative to the image; and produces a realistic virtual 3D model, so that the user can view house models and indoor roaming without leaving home [17]. Through these multimedia resources, the user can interact with the computer in real-time, which is a new model of human-computer interaction.…”
Section: Imagementioning
confidence: 99%
“…In this context, wireless communication represents an indispensable component of network communication, and its security is directly related to the secure transmission and storage of information. It is therefore crucial to resist the increasing frequency and complexity of network threats and ensure the secure transmission of information [ 1 3 ]. Therefore, wireless communication has become a top priority in network security strategy.…”
Section: Introductionmentioning
confidence: 99%