Search

Your search keyword '"Identification scheme"' showing total 1,562 results

Search Constraints

Start Over You searched for: Descriptor "Identification scheme" Remove constraint Descriptor: "Identification scheme"
1,562 results on '"Identification scheme"'

Search Results

1. Parameter-Hiding Order-Revealing Encryption Without Pairings

2. Cryptanalysis of Human Identification Protocol with Human-Computable Passwords

3. Multivariate Partially Blind Signature Scheme

4. Rank AGS Identification Scheme and Signature Scheme.

5. An Efficient Identification Scheme Based on Bivariate Function Hard Problem.

6. An Efficient Identification Scheme Based on Rank Metric

7. Asymmetric subversion attacks on signature and identification schemes.

8. Rank AGS Identification Scheme and Signature Scheme

9. Rethinking Identification Protocols from the Point of View of the GDPR

10. Quasi-Dyadic Girault Identification Scheme

12. An Efficient Identification Scheme Based on Bivariate Function Hard Problem

13. A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries

14. Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures

15. Strongly Deniable Identification Schemes Immune to Prover’s and Verifier’s Ephemeral Leakage

16. A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography

17. Identification of the Relationship between Maritime Autonomous Surface Ships and the Operator's Mental Workload.

18. Relay‐based identification scheme for processes with non‐minimum phase and time delay.

19. From Identification to Signatures, Tightly: A Framework and Generic Transforms

20. Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret

21. Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage

22. Fast Low Frequency Fault Location and Section Identification Scheme for VSC-Based Multi-Terminal HVDC Systems

23. Rank AGS Identification Scheme and Signature Scheme

24. Identification of the Relationship between Maritime Autonomous Surface Ships and the Operator’s Mental Workload

25. Quantitative Identification Scheme for Multiple Analytes With a Mode-Localized Cantilever Array.

26. Reinforcement-Learning-Based Spatial Resource Identification for IoT D2D Communications

27. Nonlinear Identification for 4-DOF Ship Maneuvering Modeling via Full-Scale Trial Data

28. Identification of IPMSM Flux-Linkage Map for High-Accuracy Simulation of IPMSM Drives

30. Simplified murine multipotent progenitor isolation scheme: Establishing a consensus approach for multipotent progenitor identification

31. Modified grey wolf optimizer-based support vector regression for ship maneuvering identification with full-scale trial

32. Wavelet-based multiresolution analysis coupled with deep learning to efficiently monitor cracks in concrete

33. Development of a Front Identification Scheme for Compiling a Cold Front Climatology of the Mediterranean

34. An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

35. Blind Identification of LDPC Codes Based on a Candidate Set

36. Efficient fault identification scheme of compensated transmission grid based on correlated reactive power measurements and discrete wavelet transform

37. Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials

38. Identification Schemes from Key Encapsulation Mechanisms

39. Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks

40. Improved Zero-Knowledge Identification with Lattices

41. A Lattice-Based Threshold Ring Signature Scheme

42. Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness

44. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles

45. An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model

46. Hypothesis Testing and Identification Systems

47. A Novel Identification Scheme of Lightning Disturbance in HVDC Transmission Lines Based on CEEMD-HHT

48. Fast protection strategy for DC transmission lines of MMC-based MT-HVDC grid

50. A Novel Approach for QoS Enhancement with Revision Scheme Using SeDSR Protocol in Wireless Sensor Networks

Catalog

Books, media, physical & digital resources