Search

Your search keyword '"*KEY agreement protocols (Computer network protocols)"' showing total 29 results

Search Constraints

Start Over You searched for: Descriptor "*KEY agreement protocols (Computer network protocols)" Remove constraint Descriptor: "*KEY agreement protocols (Computer network protocols)" Publisher ieee Remove constraint Publisher: ieee
29 results on '"*KEY agreement protocols (Computer network protocols)"'

Search Results

1. From Single-Protocol to Large-Scale Multi-Protocol Quantum Networks.

2. An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.

3. Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs.

4. A Generic Dynamic Responding Mechanism and Secure Authentication Protocol for Strong PUFs.

5. HeteroSAg: Secure Aggregation With Heterogeneous Quantization in Federated Learning.

6. In-Band Secret-Free Pairing for COTS Wireless Devices.

7. Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System.

8. Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF.

9. Monitoring Link Faults in Nonlinear Diffusively Coupled Networks.

10. An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks.

11. Blockchain-Based Secure Communication for Space Information Networks.

12. 2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning.

13. A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF-Based Authentication.

14. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things.

15. SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication.

16. The Design of Hierarchical Consensus Mechanism Based on Service-Zone Sharding.

17. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones.

18. Efficient Physical Layer Key Agreement for FlexRay Networks.

19. GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices.

20. On the Optimality of Secret Key Agreement via Omniscience.

21. Information Complexity Density and Simulation of Protocols.

22. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

23. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks.

24. An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration.

25. On the Ergodic Secret-Key Agreement Over Spatially Correlated Multiple-Antenna Channels With Public Discussion.

26. Comments On “Information-Theoretic Key Agreement of Multiple Terminals—Part I”.

27. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.

28. Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets.

29. Construction of Codes for the Wiretap Channel and the Secret Key Agreement From Correlated Source Outputs Based on the Hash Property.

Catalog

Books, media, physical & digital resources