Search

Your search keyword '"Group key"' showing total 1,306 results

Search Constraints

Start Over You searched for: Descriptor "Group key" Remove constraint Descriptor: "Group key"
1,306 results on '"Group key"'

Search Results

251. The octet rule in chemical space: generating virtual molecules

252. MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks

253. Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs

254. Group Rekeying in the Exclusive Subset-Cover Framework

255. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

256. Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification

257. A Novel Design of Membership Authentication and Group Key Establishment Protocol

258. Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members

259. Imp roved Key Management Technique for Secure Multicasting over IP.

260. Password-Authenticated Group Key Exchange

261. Secure In-Band Bootstrapping for Wireless Personal Area Networks

262. From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives

263. Group Key Establishment

264. Efficient and Secure Group Data Sharing Model based on Selection scheme in Cloud environment

265. Secured Cluster-Based Distributed Dynamic Group Key Management for Wireless Sensor Networks

266. Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication

267. Light-Weighted Password-Based Multi-Group Authenticated Key Agreement for Wireless Sensor Networks

268. An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting

269. Implementation of Secrete Message Communication in Server/Client Environment Using Splines Based on PKCS

270. An Efficient and Scalable Distributed Key Management Scheme Using Ternary Tree for Secure Communication in Dynamic Groups

271. Low-Latency Exchange of Common Randomness for Group-Key Generation

272. Achieve Revocable Access Control for Fog-Based Smart Grid System

273. Automated verification of group key agreement protocols

274. An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs

275. Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem

276. Secure and Efficient MQTT Group Communication Design

277. PUF-based Anonymous RFID system Ownership Transfer Protocol

278. Group Key Agreement for Mission-Critical Wireless Mesh Networks

279. Unique Group Key Establishment Scheme for Internet of Thing

280. An effective security protocol for GDS (group Data sharing) in Healthcare Cloud Environment

281. Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks

282. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System

283. Lightweight IoT Group Key Establishment Scheme From the One Time Pad

284. Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

285. On the Security of Authenticated Group Key Agreement Protocols

286. On The Performance Bound of Structured Key-Based RFID Authentication

287. Geometric Pairwise Key-Sharing Scheme

288. HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks

289. Efficient Geometric Group Key-sharing Scheme

290. Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis

291. Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems

292. Secure Information Sharing System for Online Patient Networks

293. Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network

294. Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements

295. SSPSoC: A Secure SDN-Based Protocol over MPSoC

296. ELCPH

297. A Genetic-Based Bayesian Framework for Stateless Group Key Management in Mobile Ad Hoc Networks

298. Lightweight Group Authentication with Dynamic Vehicle-Clustering for 5G-Based V2X Communications

299. A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption

300. Services and Applications Security in IoT Enabled Networks

Catalog

Books, media, physical & digital resources