Search

Your search keyword '"Key distribution"' showing total 112 results

Search Constraints

Start Over You searched for: Descriptor "Key distribution" Remove constraint Descriptor: "Key distribution" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
112 results on '"Key distribution"'

Search Results

1. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

2. A Tale of Two Automotive Security Services: A Formal Analysis

3. A Provably Secure ECC-Based Key Distribution Scheme for Secure Message Transmission in Vehicular Ad Hoc Networks

6. A Secure Key Management on ODMRP in Mesh-Based Multicast Network

7. Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks

8. Validate Merchant Server for Secure Payment Using Key Distribution

11. Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance

12. Quantum Computation-Based Secured Key Distribution Protocols

13. Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms

14. Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment

15. Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems

17. Key Management Scheme for Secure Group Communication

19. An Operation Method for Uplink Science Meta Data Transmission Based on Satellite-to-Ground Large-Loop Comparison

20. From Parallelism to Nonuniversality: An Unconventional Trajectory

21. Comparative Analysis of Cryptographic Key Management Systems

23. A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things

26. An Enhanced Efficiency of Key Management Method for Wireless Sensor Networks Using Mobile Agents

28. Chip-Based Key Distribution Technique

29. Secure and Efficient Data Sharing with User Revocation in Cloud

31. Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud

32. Reliable Key Distribution in Smart Micro-Grids

33. Cloud Storage Security Mechanisms

34. Risk Assessment of the 3Des in ERTMS

36. A Comprehensive and Lightweight Security Architecture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO

37. A Secure Multicast Key Agreement Scheme

39. Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications

41. Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys

43. Secure and Practical Key Distribution for RFID-Enabled Supply Chains

44. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

45. A Communication Efficient Group Key Distribution Scheme for MANETs

46. Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries

47. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks

48. Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation

Catalog

Books, media, physical & digital resources