Works matching DE "AGREEMENT protocols (Computer network protocols)"
Results: 48
Efficient ID-based authentication and key agreement protocols for the session initiation protocol.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. 2, p. 560, doi. 10.3906/elk-1207-102
- By:
- Publication type:
- Article
An Improved Protocol for the Password Authenticated Association of IEEE 802.15.6 Standard That Alleviates Computational Burden on the Node.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 11, p. 131, doi. 10.3390/sym8110131
- By:
- Publication type:
- Article
Extending ODRL to Support Dynamic Digital Rights Management.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 3, p. 127
- By:
- Publication type:
- Article
The «individual placement and support» method to promote the socio-occupational integration of people with severe psychiatric disorders.
- Published in:
- Relational Social Work, 2024, v. 8, n. 1, p. 77, doi. 10.14605/RSW812405
- By:
- Publication type:
- Article
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
- Published in:
- Computer Journal, 2016, v. 59, n. 7, p. 945, doi. 10.1093/comjnl/bxv098
- By:
- Publication type:
- Article
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
- Published in:
- Computer Journal, 2014, v. 57, n. 10, p. 1580
- By:
- Publication type:
- Article
Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC.
- Published in:
- ISeCure, 2013, v. 5, n. 1, p. 55
- By:
- Publication type:
- Article
Editorial.
- Published in:
- ISeCure, 2013, v. 5, n. 1, p. 1
- By:
- Publication type:
- Article
An Asynchronous FPGA Block with Its Tech-Mapping Algorithm Dedicated to Security Applications.
- Published in:
- International Journal of Reconfigurable Computing, 2013, p. 1, doi. 10.1155/2013/517947
- By:
- Publication type:
- Article
Toward a Game Theoretic View of Secure Computation.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 4, p. 879, doi. 10.1007/s00145-015-9212-6
- By:
- Publication type:
- Article
Climate-Conscious Commitments: Marching to Greener Contracts.
- Published in:
- Contract Management, 2024, v. 64, n. 3, p. 52
- By:
- Publication type:
- Article
Creating appropriate participatory action research with remote First Nations.
- Published in:
- Antistasis: An Open Educational Journal, 2015, v. 5, n. 2, p. 50
- By:
- Publication type:
- Article
Two-party quantum key agreement protocols under collective noise channel.
- Published in:
- Quantum Information Processing, 2018, v. 17, n. 6, p. 1, doi. 10.1007/s11128-018-1910-1
- By:
- Publication type:
- Article
Quantum key agreement protocols with four-qubit cluster states.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 9, p. 3483, doi. 10.1007/s11128-015-1060-7
- By:
- Publication type:
- Article
Trust-based authentication scheme with user rating for low-resource devices in smart environments.
- Published in:
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 1013, doi. 10.1007/s00779-012-0548-8
- By:
- Publication type:
- Article
Forthcoming evidence-based courses and conferences.
- Published in:
- Evidence-Based Dentistry, 2017, v. 18, n. 4, p. 127, doi. 10.1038/sj.ebd.6401278
- Publication type:
- Article
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism.
- Published in:
- Computer Journal, 2024, v. 67, n. 8, p. 2586, doi. 10.1093/comjnl/bxae027
- By:
- Publication type:
- Article
Tolerating Random Byzantine Failures in an Unbounded Network.
- Published in:
- Parallel Processing Letters, 2016, v. 26, n. 1, p. -1, doi. 10.1142/S0129626416500031
- By:
- Publication type:
- Article
An Untraceable ECC-Based Remote User Authentication Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1742, doi. 10.3837/tiis.2017.03.027
- By:
- Publication type:
- Article
A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 2, p. 924, doi. 10.3837/tiis.2017.02.016
- By:
- Publication type:
- Article
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5572, doi. 10.3837/tiis.2016.12.023
- By:
- Publication type:
- Article
Agreement function model for pose estimation.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 20, p. 1677, doi. 10.1049/el.2016.2338
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1321, doi. 10.1002/sec.1417
- By:
- Publication type:
- Article
Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 4289, doi. 10.1002/sec.1342
- By:
- Publication type:
- Article
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 11, p. 1971, doi. 10.1002/sec.1145
- By:
- Publication type:
- Article
A new certificateless authenticated key agreement protocol for SIP with different KGCs.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 631, doi. 10.1002/sec.595
- By:
- Publication type:
- Article
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 1, p. 195, doi. 10.1007/s10773-017-3553-x
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 3, p. 431, doi. 10.5755/j01.itc.47.3.17361
- By:
- Publication type:
- Article
"A study of Group Key Management Protection in Non-Network".
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 3647
- By:
- Publication type:
- Article
An Energy-Efficient Protocol Using an Objective Function & Random Search with Jumps for WSN.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 3, p. 603, doi. 10.32604/cmc.2019.05341
- By:
- Publication type:
- Article
Multiparty quantum key agreement based on Grover's algorithm and its implementation.
- Published in:
- Modern Physics Letters A, 2018, v. 33, n. 36, p. N.PAG, doi. 10.1142/S0217732318502103
- By:
- Publication type:
- Article
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 79, doi. 10.1007/s12083-015-0408-1
- By:
- Publication type:
- Article
Certificateless and identity-based authenticated asymmetric group key agreement.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 5, p. 559, doi. 10.1007/s10207-016-0339-8
- By:
- Publication type:
- Article
Message from the guest editors.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 6, p. 573, doi. 10.1007/s10207-016-0353-x
- By:
- Publication type:
- Article
Improving the ISO/IEC 11770 standard for key management techniques.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 6, p. 659, doi. 10.1007/s10207-015-0306-9
- By:
- Publication type:
- Article
DIGRAPHS WITH DISTINGUISHABLE DYNAMICS UNDER THE MULTI-AGENT AGREEMENT PROTOCOL.
- Published in:
- Asian Journal of Control, 2014, v. 16, n. 5, p. 1300, doi. 10.1002/asjc.868
- By:
- Publication type:
- Article
Source Routing Over Protocol-Oblivious Forwarding for Named Data Networking.
- Published in:
- Journal of Network & Systems Management, 2018, v. 26, n. 4, p. 857, doi. 10.1007/s10922-017-9445-9
- By:
- Publication type:
- Article
China and International Order: The Limits of Integration.
- Published in:
- Journal of Chinese Political Science, 2016, v. 21, n. 2, p. 177, doi. 10.1007/s11366-016-9403-5
- By:
- Publication type:
- Article
Categorical interpretations of some key agreement protocols.
- Published in:
- Journal of Mathematical Sciences, 2013, v. 195, n. 4, p. 439, doi. 10.1007/s10958-013-1588-y
- By:
- Publication type:
- Article
Design and Analysis of a Provably Secure Multi-server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1095, doi. 10.1007/s11277-015-2975-0
- By:
- Publication type:
- Article
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 1487, doi. 10.1007/s11277-014-1829-5
- By:
- Publication type:
- Article
A twofold group key agreement protocol for NoC‐based MPSoCs.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 6, p. N.PAG, doi. 10.1002/ett.3633
- By:
- Publication type:
- Article
NOWHERE TO HIDE: ENDING ANONYMITY IN THE FIGHT AGAINST HUMAN TRAFFICKING.
- Published in:
- Journal of Law, Technology & the Internet, 2014, v. 5, n. 1, p. 201
- By:
- Publication type:
- Article
Generalized Paxos Made Byzantine (and Less Complex) †.
- Published in:
- Algorithms, 2018, v. 11, n. 9, p. 141, doi. 10.3390/a11090141
- By:
- Publication type:
- Article
An Efficient Clustering Protocol for Wireless Sensor Networks Based on Localized Game Theoretical Approach.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/476313
- By:
- Publication type:
- Article
Two-party quantum key agreement protocol with four-particle entangled states.
- Published in:
- Modern Physics Letters B, 2016, v. 30, n. 26, p. -1, doi. 10.1142/S0217984916503322
- By:
- Publication type:
- Article
Efficient Modified Elliptic Curve Diffie-Hellman Algorithm for VoIP Networks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2016, v. 13, n. 5, p. 492
- By:
- Publication type:
- Article
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 221
- By:
- Publication type:
- Article