Search

Your search keyword '"*KEY agreement protocols (Computer network protocols)"' showing total 338 results

Search Constraints

Start Over You searched for: Descriptor "*KEY agreement protocols (Computer network protocols)" Remove constraint Descriptor: "*KEY agreement protocols (Computer network protocols)"
338 results on '"*KEY agreement protocols (Computer network protocols)"'

Search Results

1. Preface: International Conference on Research in Sciences, Engineering & Technology.

2. Dynamic authentication for intelligent sensor clouds in the Internet of Things.

3. An anonymous mutual authentication and key agreement scheme in WMSN using physiological data.

4. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function.

5. An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks.

6. Multidimensional Byzantine agreement in a synchronous setting.

7. PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks.

8. Security assessment and improvement of smart grid NIKE protocol.

9. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks.

10. A PID tuning approach to find the optimal compromise among robustness, performance and control effort: implementation in a free software tool.

11. Self-Bilinear Map from One Way Encoding System and i.

12. A novel token-based authentication algorithm for DoS attacks in wireless sensor network.

13. Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams.

14. Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.

15. Efficient Mediated Quantum Secret Sharing Protocol in a Restricted Quantum Environment.

16. CVFL: A Chain-like and Verifiable Federated Learning Scheme with Computational Efficiency Based on Lagrange Interpolation Functions.

17. EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.

18. Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology.

19. Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT.

20. An efficient technique for breaking of coloured Hindi CAPTCHA.

21. Dynamic full quantum one-way function based on quantum circuit mapping.

22. An enhanced secure delegation‐based anonymous authentication protocol for PCSs.

23. An efficient lightweight authentication scheme for human‐centered industrial Internet of Things.

24. A novel and quantum-resistant handover authentication protocol in IoT environment.

25. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.

26. Security of Neural Network-Based Key Agreement Protocol for Smart Grids.

27. Simple Yet Secure Encoder Architecture and Ultralightweight Mutual Authentication Protocol for RFID Tags in IoT.

28. Improved quantum key agreement protocol with authentication.

29. A novel efficient and lightweight authentication scheme for secure smart grid communication systems.

30. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.

31. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.

32. 可证明安全的后量子两方口令认证密钥协商协议.

33. Secure user authentication and key agreement scheme for IoT device access control based smart home communications.

34. Provably secure certificateless protocol for wireless body area network.

35. Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model.

36. Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things.

37. Seamless inter cloud data transfer.

38. The secure judgment of graphic similarity against malicious adversaries and its applications.

39. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.

40. LACP-SG: Lightweight Authentication Protocol for Smart Grids.

41. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

42. A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information.

43. Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing.

44. Password authentication key exchange based on key consensus for IoT security.

45. Semi-Quantum Identification without Information Leakage.

46. Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme.

47. 理想格上的多阶段认证密钥交换协议.

48. Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol.

49. Secure Authentication in the Smart Grid.

50. Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement.

Catalog

Books, media, physical & digital resources