Search

Your search keyword '"*KEY agreement protocols (Computer network protocols)"' showing total 339 results

Search Constraints

Start Over You searched for: Descriptor "*KEY agreement protocols (Computer network protocols)" Remove constraint Descriptor: "*KEY agreement protocols (Computer network protocols)"
339 results on '"*KEY agreement protocols (Computer network protocols)"'

Search Results

1. Preface: International Conference on Research in Sciences, Engineering & Technology.

2. An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks.

3. Dynamic authentication for intelligent sensor clouds in the Internet of Things.

4. An anonymous mutual authentication and key agreement scheme in WMSN using physiological data.

5. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function.

6. Multidimensional Byzantine agreement in a synchronous setting.

7. PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks.

8. Security assessment and improvement of smart grid NIKE protocol.

9. A novel token-based authentication algorithm for DoS attacks in wireless sensor network.

10. ECC-based three-factor authentication and key agreement scheme for wireless sensor networks.

11. A PID tuning approach to find the optimal compromise among robustness, performance and control effort: implementation in a free software tool.

12. Self-Bilinear Map from One Way Encoding System and i.

13. Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams.

14. Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.

15. Efficient Mediated Quantum Secret Sharing Protocol in a Restricted Quantum Environment.

16. CVFL: A Chain-like and Verifiable Federated Learning Scheme with Computational Efficiency Based on Lagrange Interpolation Functions.

17. EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.

18. Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology.

19. Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT.

20. An efficient technique for breaking of coloured Hindi CAPTCHA.

21. An enhanced secure delegation‐based anonymous authentication protocol for PCSs.

22. An efficient lightweight authentication scheme for human‐centered industrial Internet of Things.

23. Dynamic full quantum one-way function based on quantum circuit mapping.

24. A novel and quantum-resistant handover authentication protocol in IoT environment.

25. Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.

26. Security of Neural Network-Based Key Agreement Protocol for Smart Grids.

27. Simple Yet Secure Encoder Architecture and Ultralightweight Mutual Authentication Protocol for RFID Tags in IoT.

28. Improved quantum key agreement protocol with authentication.

29. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.

30. A novel efficient and lightweight authentication scheme for secure smart grid communication systems.

31. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.

32. 可证明安全的后量子两方口令认证密钥协商协议.

33. Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things.

34. Provably secure certificateless protocol for wireless body area network.

35. Secure user authentication and key agreement scheme for IoT device access control based smart home communications.

36. Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model.

37. The secure judgment of graphic similarity against malicious adversaries and its applications.

38. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.

39. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

40. LACP-SG: Lightweight Authentication Protocol for Smart Grids.

41. A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information.

42. Password authentication key exchange based on key consensus for IoT security.

43. Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing.

44. Seamless inter cloud data transfer.

45. Semi-Quantum Identification without Information Leakage.

46. Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme.

47. Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol.

48. 理想格上的多阶段认证密钥交换协议.

49. Secure Authentication in the Smart Grid.

50. Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement.

Catalog

Books, media, physical & digital resources