Search

Your search keyword '"Key distribution"' showing total 5,517 results

Search Constraints

Start Over You searched for: Descriptor "Key distribution" Remove constraint Descriptor: "Key distribution"
5,517 results on '"Key distribution"'

Search Results

1. Quantum intrusion detection system using outlier analysis.

2. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication.

3. Quantum intrusion detection system using outlier analysis

4. In-situ key update and minimal key set of encrypted outsourced data under binary key-derivation tree.

5. Experimental demonstration of quantum encryption in phase space with displacement operator in coherent optical communications.

6. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

7. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication

8. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

9. A Tale of Two Automotive Security Services: A Formal Analysis

11. Distinct difference configurations in groups

12. Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functions.

13. A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks

14. Wireless-Channel Key Distribution Based on Laser Synchronization.

15. A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT

16. A Provably Secure ECC-Based Key Distribution Scheme for Secure Message Transmission in Vehicular Ad Hoc Networks

19. A Secure Key Management on ODMRP in Mesh-Based Multicast Network

20. Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks

21. Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

22. Dynamic Secure Key Distribution Based on Dispersion Equalization and Cellular Automata for Optical Transmission.

23. DYNAMIC KEY GENERATION AND DISTRIBUTION COMPARISON USING MACHINE LEARNING INTEGRATED NODE AUTHENTICATION ROUTING PROTOCOL FOR IMPROVING QOS IN VANET.

24. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks.

25. Validate Merchant Server for Secure Payment Using Key Distribution

26. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.

27. Wireless-Channel Key Distribution Based on Laser Synchronization

28. Authenticated Tree-Based R-LWE Group Key Exchange.

29. Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution.

30. Combined Optical Fiber Transmission System Based on QNSC and BER-LM.

31. Minimal key set of binary key-derivation tree in cloud storage.

32. A key distribution technique for wireless sensor networks using spanning trees.

33. Dynamic Secure Key Distribution Based on Dispersion Equalization and Cellular Automata for Optical Transmission

36. Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance

37. Quantum Computation-Based Secured Key Distribution Protocols

38. Quantum Computing Cryptography and Lattice Mechanism.

39. An efficient key distribution Scheme for WSN with Mutual Healing Capability.

40. A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS.

41. Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey.

42. Securely Cloud Data Storage and Sharing

43. Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms

44. Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment

45. Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems

47. Key Management Scheme for Secure Group Communication

49. An Operation Method for Uplink Science Meta Data Transmission Based on Satellite-to-Ground Large-Loop Comparison

50. From Parallelism to Nonuniversality: An Unconventional Trajectory

Catalog

Books, media, physical & digital resources