Works about KEY agreement protocols (Computer network protocols)
Results: 484
The oblivious comparison sorting protocols for secure multi-party computation.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 26, p. 67763, doi. 10.1007/s11042-024-18139-6
- By:
- Publication type:
- Article
Blockchain based authentication and access control protocol for IoT.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 51731, doi. 10.1007/s11042-023-17607-9
- By:
- Publication type:
- Article
Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 27, p. 39367, doi. 10.1007/s11042-022-12088-8
- By:
- Publication type:
- Article
A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 27683, doi. 10.1007/s11042-022-12946-5
- By:
- Publication type:
- Article
A review of hashing based image authentication techniques.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 2, p. 2489, doi. 10.1007/s11042-021-11649-7
- By:
- Publication type:
- Article
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 2, p. 129, doi. 10.1049/ntw2.12113
- By:
- Publication type:
- Article
事件触发控制下多智能体系统的部分分量一致性.
- Published in:
- Journal of Guangxi Normal University - Natural Science Edition, 2023, v. 41, n. 4, p. 149, doi. 10.16088/j.issn.1001-6600.2022090401
- By:
- Publication type:
- Article
Comparison of group key establishment protocols.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 1, p. 46, doi. 10.3906/elk-1407-213
- By:
- Publication type:
- Article
CVFL: A Chain-like and Verifiable Federated Learning Scheme with Computational Efficiency Based on Lagrange Interpolation Functions.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 21, p. 4547, doi. 10.3390/math11214547
- By:
- Publication type:
- Article
Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 17, p. 3701, doi. 10.3390/math11173701
- By:
- Publication type:
- Article
Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 7, p. 1638, doi. 10.3390/math11071638
- By:
- Publication type:
- Article
Semi-Quantum Identification without Information Leakage.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 2, p. 452, doi. 10.3390/math11020452
- By:
- Publication type:
- Article
Secure Authentication in the Smart Grid.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 176, doi. 10.3390/math11010176
- By:
- Publication type:
- Article
Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 5, doi. 10.3390/math11010005
- By:
- Publication type:
- Article
BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 24, p. 3241, doi. 10.3390/math9243241
- By:
- Publication type:
- Article
THE CLOUD GNSS DATA FUSION APPROACH BASED ON THE MULTI-AGENT AUTHENTICATION PROTOCOLS’ ANALYSIS IN THE CORPORATE LOGISTICS MANAGEMENT SYSTEMS.
- Published in:
- Radio Electronics, Computer Science, Control, 2021, n. 4, p. 95, doi. 10.15588/1607-3274-2021-4-9
- By:
- Publication type:
- Article
Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-67064-z
- By:
- Publication type:
- Article
Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks.
- Published in:
- Future Internet, 2024, v. 16, n. 6, p. 209, doi. 10.3390/fi16060209
- By:
- Publication type:
- Article
Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare.
- Published in:
- Future Internet, 2023, v. 15, n. 12, p. 386, doi. 10.3390/fi15120386
- By:
- Publication type:
- Article
Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 10, p. 1886, doi. 10.3390/sym15101886
- By:
- Publication type:
- Article
An Authentication Protocol for the Medical Internet of Things.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 7, p. N.PAG, doi. 10.3390/sym14071483
- By:
- Publication type:
- Article
A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 1, p. 46, doi. 10.3390/sym14010046
- By:
- Publication type:
- Article
Enhanced Matrix Power Function for Cryptographic Primitive Construction.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 2, p. 43, doi. 10.3390/sym10020043
- By:
- Publication type:
- Article
An Efficient Two Factor User Authentication and Key Exchange Protocol for Telecare Medical Information System.
- Published in:
- International Journal of Mathematics & Computer Science, 2020, v. 15, n. 4, p. 1015
- By:
- Publication type:
- Article
Multi‐Site Transfer Function Approach for Real‐Time Modeling of the Ground Electric Field Induced by Laterally‐Nonuniform Ionospheric Source.
- Published in:
- Space Weather: The International Journal of Research & Applications, 2023, v. 21, n. 10, p. 1, doi. 10.1029/2023SW003621
- By:
- Publication type:
- Article
Toward Designing a Secure Authentication Protocol for IoT Environments.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 7, p. 5934, doi. 10.3390/su15075934
- By:
- Publication type:
- Article
Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 7, p. 5734, doi. 10.3390/su15075734
- By:
- Publication type:
- Article
Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 6, p. 5346, doi. 10.3390/su15065346
- By:
- Publication type:
- Article
SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 17, p. 11054, doi. 10.3390/su141711054
- By:
- Publication type:
- Article
A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 1, p. 400, doi. 10.3390/su13010400
- By:
- Publication type:
- Article
A Secure Data Authentication in Wireless Body Area Network for Health Monitoring Using Electrocardiogram-Based Key Agreement.
- Published in:
- International Review on Computers & Software, 2016, v. 11, n. 7, p. 622, doi. 10.15866/irecos.v11i7.9591
- By:
- Publication type:
- Article
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/5526412
- By:
- Publication type:
- Article
Robust state agreement of nonlinear multi‐agent systems with measurement and actuator disturbances.
- Published in:
- International Journal of Robust & Nonlinear Control, 2022, v. 32, n. 3, p. 1143, doi. 10.1002/rnc.5872
- By:
- Publication type:
- Article
Guest editorial: Smart communications and networking: architecture, applications, and future challenges.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 10, p. 1021, doi. 10.1049/cmu2.12373
- By:
- Publication type:
- Article
A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 10, p. 1142, doi. 10.1049/cmu2.12295
- By:
- Publication type:
- Article
Security analysis of TLS protocol implementations based on model checking.
- Published in:
- Systems Engineering & Electronics, 2021, v. 43, n. 3, p. 839, doi. 10.12305/j.issn.1001-506X.2021.03.30
- By:
- Publication type:
- Article
Advancing Secure Mobile Cloud Computing: A Chaotic Maps-Based Password Key Agreement Protocol.
- Published in:
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 6, p. 1669, doi. 10.18280/isi.280625
- By:
- Publication type:
- Article
煤矿采掘装备核心控制技术现状和发展趋势.
- Published in:
- Coal Science & Technology (0253-2336), 2020, v. 48, n. 12, p. 153, doi. 10.13199/j.cnki.cst.2020.12.019
- By:
- Publication type:
- Article
Analyzing cognitive processes of a product/service-system design session using protocol analysis.
- Published in:
- AI EDAM, 2020, v. 34, n. 4, p. 515, doi. 10.1017/S0890060420000402
- By:
- Publication type:
- Article
Key Agreement for Large-Scale Dynamic Peer Group.
- Published in:
- GSTF Journal on Computing, 2011, v. 1, n. 2, p. 52, doi. 10.5176/2010-2283_1.2.39
- By:
- Publication type:
- Article
A Generic Approach to Improving Diffie–Hellman Key Agreement Efficiency for Thin Clients.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 592, doi. 10.1093/comjnl/bxv094
- By:
- Publication type:
- Article
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2509, doi. 10.1093/comjnl/bxu099
- By:
- Publication type:
- Article
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
- Published in:
- Computer Journal, 2014, v. 57, n. 10, p. 1580
- By:
- Publication type:
- Article
Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/1814053
- By:
- Publication type:
- Article
IPSadas: Identity‐privacy‐aware secure and anonymous data aggregation scheme.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 8, p. 5290, doi. 10.1002/int.22793
- By:
- Publication type:
- Article
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 890, doi. 10.1007/s11036-018-1145-5
- By:
- Publication type:
- Article
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 1046, doi. 10.1007/s11036-018-1061-8
- By:
- Publication type:
- Article
Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party.
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 5, p. 1132, doi. 10.1007/s11036-016-0776-7
- By:
- Publication type:
- Article
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 3, p. 510, doi. 10.1007/s11036-017-0870-5
- By:
- Publication type:
- Article
'Security-Aware and Data Intensive Low-Cost Mobile Systems' Editorial.
- Published in:
- 2013
- By:
- Publication type:
- Editorial