Search

Your search keyword '"Key distribution"' showing total 5,511 results

Search Constraints

Start Over You searched for: Descriptor "Key distribution" Remove constraint Descriptor: "Key distribution"
5,511 results on '"Key distribution"'

Search Results

51. Cost Effective Decentralized Key Management Framework for IoT.

52. A key distribution technique for wireless sensor networks using spanning trees.

53. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network

54. Application of CSK Encryption Algorithm in Video Synergic Command Systems.

55. A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things

58. An Enhanced Efficiency of Key Management Method for Wireless Sensor Networks Using Mobile Agents

60. Privacy protection key distribution protocol for edge computing

61. A new video encryption method based on modified OFB mode

62. Privacy protection key distribution protocol for edge computing

63. KeyShield: A Scalable and Quantum-Safe Key Management Scheme

64. PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network.

65. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

66. Group Key Management Protocol for File Sharing on Cloud Storage

67. Combined Optical Fiber Transmission System Based on QNSC and BER-LM

70. Thermal state quantum key distribution.

71. A New Secure Quantum Signature Masked Authentication Scheme.

72. Chip-Based Key Distribution Technique

73. Secure and Efficient Data Sharing with User Revocation in Cloud

74. Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors

75. Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

76. A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things

78. Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud

79. Reliable Key Distribution in Smart Micro-Grids

80. Delaunay Triangulation Based Key Distribution for Three-Dimensional Wireless Sensor Networks.

81. KEY DISTRIBUTION USING GRAPHS FOR SECRET SHARING.

82. User-mediated authentication protocols and unforgeability in key collision.

83. Key Management and Distribution for Mobile Ad-Hoc Network.

84. Construction contemplation of cloud platform for domestic password service based on quantum secret communication

85. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem.

86. Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography.

87. Efficient data encryption technique using quaternions for wireless sensor network.

88. PUF-Based Key Distribution in Wireless Sensor Networks.

89. Security, usability, and biometric authentication scheme for electronic voting using multiple keys.

90. Secure Shares Generation via M-Blocks Partitioning for Counting-Based Secret Sharing.

91. LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks.

92. A novel RSA algorithm for secured key transmission in a centralized cloud environment.

93. Hiding shares by multimedia image steganography for optimized counting-based secret sharing.

94. A Physical-Layer Key Distribution Mechanism for IoT Networks.

95. Efficient and Secure Key Management for Conditional Access Systems.

96. Cloud Storage Security Mechanisms

97. Risk Assessment of the 3Des in ERTMS

98. IMPROVED ALGORITHMS AND PRIMITIVES FOR QUANTUM CRYPTOGRAPHY

99. Fully Device-Independent Quantum Key Distribution Using Synchronous Correlations

100. Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property

Catalog

Books, media, physical & digital resources