Search

Your search keyword '"Key generation"' showing total 32 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Publisher mdpi Remove constraint Publisher: mdpi
32 results on '"Key generation"'

Search Results

1. Enhancing the SRAM PUF with an XOR Gate.

2. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

3. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation.

4. Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model.

5. On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices.

6. Privacy-Preserving Blockchain Framework for Supply Chain Management: Perceptive Craving Game Search Optimization (PCGSO).

7. Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments.

8. Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model.

9. Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems.

10. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach.

11. Omega Network Pseudorandom Key Generation Based on DNA Cryptography.

12. Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.

13. Efficient RO-PUF for generation of identifiers and keys in resource-constrained embedded systems

14. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview.

15. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks.

16. A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data

17. A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

18. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks.

19. Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution

20. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities

21. Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.

22. Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation.

23. Intelligent Reflecting Surface Assisted Multi-User Robust Secret Key Generation for Low-Entropy Environments.

24. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

25. SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs.

26. A Complete Key Management Scheme for LoRaWAN v1.1 †.

27. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

28. Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness.

29. Wireless Systems and Networks in the IoT.

30. Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel.

31. Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks

32. Attack Algorithm for a Keystore-Based Secret Key Generation Method.

Catalog

Books, media, physical & digital resources