112 results on '"Key distribution"'
Search Results
2. A Tale of Two Automotive Security Services: A Formal Analysis
3. A Provably Secure ECC-Based Key Distribution Scheme for Secure Message Transmission in Vehicular Ad Hoc Networks
4. Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography
5. A Survey of Cryptographic Algorithms for Encryption and Key Transmission
6. A Secure Key Management on ODMRP in Mesh-Based Multicast Network
7. Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks
8. Validate Merchant Server for Secure Payment Using Key Distribution
9. Quantum Computing and Its Impact
10. Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation
11. Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance
12. Quantum Computation-Based Secured Key Distribution Protocols
13. Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms
14. Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment
15. Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems
16. An Effective and Secure Key Management Protocol for Access Control in Pay-TV Broadcasting Systems Using Theory of Numbers
17. Key Management Scheme for Secure Group Communication
18. Efficient Reconfigurable Integrated Cryptosystems for Cybersecurity Protection
19. An Operation Method for Uplink Science Meta Data Transmission Based on Satellite-to-Ground Large-Loop Comparison
20. From Parallelism to Nonuniversality: An Unconventional Trajectory
21. Comparative Analysis of Cryptographic Key Management Systems
22. A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics
23. A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things
24. AOR-ID-KAP: An Authenticated One-Round Identity-Based Key Agreement Protocol for Wireless Sensor Network
25. Efficient Key Distribution and Mutual Authentication Mechanism Using Modified Needham–Schroeder and Otway–Rees Protocol for Cloud Environment
26. An Enhanced Efficiency of Key Management Method for Wireless Sensor Networks Using Mobile Agents
27. Efficient Decentralized Key Management Approach for Vehicular Ad Hoc Network
28. Chip-Based Key Distribution Technique
29. Secure and Efficient Data Sharing with User Revocation in Cloud
30. Short Review on Quantum Key Distribution Protocols
31. Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud
32. Reliable Key Distribution in Smart Micro-Grids
33. Cloud Storage Security Mechanisms
34. Risk Assessment of the 3Des in ERTMS
35. Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys
36. A Comprehensive and Lightweight Security Architecture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO
37. A Secure Multicast Key Agreement Scheme
38. Development of DDoS Attack Defense System Based on IKEv2 Protocol
39. Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications
40. Deterministic Evaluation of Identity Based Random Key Distribution Using Deployment Knowledge in WSNs
41. Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys
42. Role Based Dynamic Trust Model for Routing in Mobile Wireless Sensor Networks
43. Secure and Practical Key Distribution for RFID-Enabled Supply Chains
44. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
45. A Communication Efficient Group Key Distribution Scheme for MANETs
46. Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries
47. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
48. Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation
49. Error Detection and Correction for Secure Multicast Key Distribution Protocol
50. Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.