Auswahl der wissenschaftlichen Literatur zum Thema „Key agreement techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Key agreement techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Key agreement techniques"
Rueppel, Rainer A., und Paul C. van Oorschot. „Modern key agreement techniques“. Computer Communications 17, Nr. 7 (Juli 1994): 458–65. http://dx.doi.org/10.1016/0140-3664(94)90100-7.
Der volle Inhalt der QuelleLee, Hyang-Sook, Young-Ran Lee und Ju-Hee Lee. „MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES“. Communications of the Korean Mathematical Society 18, Nr. 1 (01.01.2003): 169–79. http://dx.doi.org/10.4134/ckms.2003.18.1.169.
Der volle Inhalt der QuelleAlimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian und M. H. Noorallahzadeh. „A Modified Hierarchical Multiple Key Agreement Scheme for WSN“. International Journal of Advanced Networking and Applications 14, Nr. 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.
Der volle Inhalt der QuelleChang, Chin-Chen, Iuon-Chang Lin und Chia-Chi Wu. „A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments“. Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Der volle Inhalt der QuelleSong, Jia, und Lin Li Wu. „Study on the Key Distribution Mechanism of Feeder Automation System“. Advanced Materials Research 532-533 (Juni 2012): 546–49. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.546.
Der volle Inhalt der QuelleSaleh, Ali, Noah Saleh, Obed Ali, Raed Hasan, Omar Ahmed, Azil Alias und Khalil Yassin. „Green Building Techniques: Under The Umbrella of the Climate Framework Agreement“. Babylonian Journal of Machine Learning 2024 (10.01.2024): 1–14. http://dx.doi.org/10.58496/bjml/2024/001.
Der volle Inhalt der QuelleSzymoniak, Sabina, und Shalini Kesar. „Key Agreement and Authentication Protocols in the Internet of Things: A Survey“. Applied Sciences 13, Nr. 1 (28.12.2022): 404. http://dx.doi.org/10.3390/app13010404.
Der volle Inhalt der QuelleEt. al., Chinnala Balakrishna,. „Hybrid Broadcast Encryption and Group Key Agreement Protocol with Precise Cipher Texts“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, Nr. 5 (10.04.2021): 984–88. http://dx.doi.org/10.17762/turcomat.v12i5.1742.
Der volle Inhalt der QuelleMo, Jiaqing, und Hang Chen. „A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks“. Security and Communication Networks 2019 (16.12.2019): 1–17. http://dx.doi.org/10.1155/2019/2136506.
Der volle Inhalt der QuelleLuque de Castro, Maria D., Jose L. Luque-García und Eva Mataix. „Analytical Pervaporation: A Key Technique in the Enological Laboratory“. Journal of AOAC INTERNATIONAL 86, Nr. 2 (01.03.2003): 394–99. http://dx.doi.org/10.1093/jaoac/86.2.394.
Der volle Inhalt der QuelleDissertationen zum Thema "Key agreement techniques"
Khalfaoui, Sameh. „Security bootstrapping for Internet of Things“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT023.
Der volle Inhalt der QuelleThe demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the first phase of the bootstrapping process cannot be efficiently conducted using pre-shared security knowledge such as digital certificates. This step is referred to as secure device pairing, and it ensures the establishment of a secure communication channel between the use and the object. The pairing phase uses a symmetric key agreement protocol that is suitable to the resource-constrained nature of these devices. The use of auxiliary channels has been proposed as a way to authenticate the key exchange, but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes use the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered a strong security assumption. The second phase of the bootstrapping process is referred to as secure device enrollment, and it aims at avoiding the associating of a malicious IoT object by authenticating its identity. The use of hardware security elements, such as the Physical Unclonable Function (PUF), has been introduced as a promising solution that is suitable for the resource-constraint nature of these devices. A growing number of PUF architectures has been demonstrated mathematically clonable through Machine Learning (ML) modeling techniques. The use of PUF ML models has been recently proposed to authenticate the IoT objects. Nonetheless, the leakage scenario of the PUF model to an adversary due to an insider threat within the organization is not supported by the existing solutions. Hence, the security of these PUF model-based enrollment proposals can be compromised.In this thesis, we study the secure bootstrapping process of resource-constrained devices and we introduce two security schemes:- A hybrid ad-hoc pairing protocol, called COOB, that efficiently combines a state-of-the-art fast context-based scheme with the use of an auxiliary channel. This protocol exploits a nonce exponentiation of the Diffie-Hellman public keys to achieve the temporary secrecy goal needed for the key agreement. Our method provides security even against an attacker that can violate the safe zone requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover.- An enrollment solution that exploits a ML PUF model in the authentication process, called Water-PUF. Our enrollment scheme is based on a specifically designed black-box watermarking technique for PUF models with a binary output response. This procedure prevents an adversary from relying on the watermarked model in question or another derivative model to bypass the authentication. Therefore, any leakage of the watermarked PUF model that is used for the enrollment does not affect the correctness of the protocol. The Water-PUF design is validated by a number of simulations against numerous watermark suppression attacks to assess the robustness of our proposal
Bücher zum Thema "Key agreement techniques"
James, Harrison. 7 Fishing and the Conservation of Marine Living Resources. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780198707325.003.0007.
Der volle Inhalt der QuelleBoulle, Laurence, und Miryana Nesic. Mediator Skills and Techniques: Triangle of Influence. Bloomsbury Professional Ltd, 2009. http://dx.doi.org/10.5040/9781526502926.
Der volle Inhalt der QuelleIversen, Vegard, Anirudh Krishna und Kunal Sen, Hrsg. Social Mobility in Developing Countries. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896858.001.0001.
Der volle Inhalt der QuelleWhish, Richard, und David Bailey. Competition Law. Oxford University Press, 2018. http://dx.doi.org/10.1093/law-ocl/9780198779063.001.0001.
Der volle Inhalt der QuelleBuchteile zum Thema "Key agreement techniques"
Prakasha, Krishna, Pratheeksha Gowda, Vasundhara Acharya, Balachandra Muniyal und Mayank Khandelwal. „Enhanced Authentication and Key Agreement Mechanism Using PKI“. In Applications and Techniques in Information Security, 40–51. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2907-4_4.
Der volle Inhalt der QuelleSasaoka, Hideichi, und Hisato Iwai. „Secret Key Agreement Techniques based on Multipath Propagation Characteristics“. In Securing Wireless Communications at the Physical Layer, 261–80. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1385-2_11.
Der volle Inhalt der QuelleYu, Yang, Aixin Zhang, Junhua Tang und Haopeng Chen. „A Dynamic Scheme for Authenticated Group Key Agreement Protocol“. In Novel Algorithms and Techniques in Telecommunications and Networking, 245–50. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3662-9_42.
Der volle Inhalt der QuelleLi, Ying, Liping Du, Guifen Zhao und Fuwei Feng. „A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing“. In Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 407–12. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23862-3_40.
Der volle Inhalt der QuelleRana, Saurabh, Dheerendra Mishra und Saurabh Gupta. „Computationally Efficient and Secure Session Key Agreement Techniques for Vehicular Cloud Computing“. In Lecture Notes in Electrical Engineering, 453–67. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_36.
Der volle Inhalt der QuelleSarkar, Pinaki, und Morshed Uddin Chowdhury. „Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)“. In Applications and Techniques in Information Security, 106–14. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2741-3_9.
Der volle Inhalt der QuellePastra, Aspasia, Thomas Klenum, Tafsir Matin Johansson, Mitchell Lennan, Sean Pribyl, Cody Warner, Damoulis Xydous und Frode Rødølen. „Lessons Learned from Maritime Nations Leading Autonomous Operations and Remote Inspection Techniques“. In Smart Ports and Robotic Systems, 363–86. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25296-9_19.
Der volle Inhalt der QuelleJaber, Nouraldin, Christopher Wagner, Swen Jacobs, Milind Kulkarni und Roopsha Samanta. „Synthesis of Distributed Agreement-Based Systems with Efficiently-Decidable Verification“. In Tools and Algorithms for the Construction and Analysis of Systems, 289–308. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_19.
Der volle Inhalt der Quelle„Group Key Agreement Techniques in Heterogeneous Networks“. In Network-Aware Security for Group Communications, 39–69. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-68848-0_3.
Der volle Inhalt der QuellePereira, Hariel Abreu, Ana Carolina Miranda Magalhães, João José de Moura Vieira, William Magalhães Barcellos und Auzuir Ripardo de Alexandria. „Hydrogen production: The future pillar of energy sector“. In Engineering and its advancements. Seven Editora, 2024. http://dx.doi.org/10.56238/sevened2024.004-009.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Key agreement techniques"
Kazempour, Narges, Mahtab Mirmohseni und Mohammad Reza Aref. „New Techniques for Localization Based Information Theoretic Secret Key Agreement“. In 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2017. http://dx.doi.org/10.1109/iscisc.2017.8488372.
Der volle Inhalt der QuelleHussain, S. Zeeshan, und Manoj Kumar. „Secret Key Agreement Schemes in IOT Based Wireless Body Area Network“. In 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2019. http://dx.doi.org/10.1109/icict46931.2019.8977632.
Der volle Inhalt der QuelleAl-Haija, Qasem Abu, Ghandi F. Manasra und Mashhoor Al Tarayrah. „Communication power analysis of applying MQV key agreement scheme for wireless sensor network“. In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS). IEEE, 2017. http://dx.doi.org/10.1109/itcosp.2017.8303103.
Der volle Inhalt der QuelleStern, Miriam. „Tipping the Scales: A Corpus-Based Reconstruction of Adjective Scales in the McGill Pain Questionnaire“. In 2nd International Conference on Machine Learning Techniques and NLP (MLNLP 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111421.
Der volle Inhalt der QuelleMeier, U., S. Freitag, J. Heinze, L. Lange, E. Magens, M. Schroll, C. Willert et al. „Characterisation of Lean Burn Module Air Blast Pilot Injector With Laser Techniques“. In ASME Turbo Expo 2013: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/gt2013-94796.
Der volle Inhalt der QuelleDhargave, Anagha, und S. U. Nimbhorkar. „Analysis of key agreement technique for cooperative wireless communication“. In 2015 2nd International Conference on Electronics and Communication Systems (ICECS). IEEE, 2015. http://dx.doi.org/10.1109/ecs.2015.7124955.
Der volle Inhalt der QuelleYao, Da-Jeng, Heng-Chieh Chien und Ming-Hsi Tseng. „A Rapid Method to Measure Thermal Conductivity of Dielectric Thin Films: Thermal Resistance Method“. In ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems collocated with the ASME 2005 Heat Transfer Summer Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/ipack2005-73350.
Der volle Inhalt der QuelleKonwar, Lakshi, Y. Y. Bu Ali, W. Ali, W. Naira, E. M. Alawainati und Matar Omar. „Determining Key Reservoir Parameters from Diagnostic Fracture Injection Test DFIT Conducted in a Disposal Well in the Bahrain Field Using Multiple Analysis Techniques“. In SPE Conference at Oman Petroleum & Energy Show. SPE, 2024. http://dx.doi.org/10.2118/218805-ms.
Der volle Inhalt der QuellePratama, Rachmadani Yusuf, Mike Yuliana und Aries Pratiarso. „Key Agreement Algorithm for V2I Communication Based on Differential Technique“. In 2021 International Electronics Symposium (IES). IEEE, 2021. http://dx.doi.org/10.1109/ies53407.2021.9594023.
Der volle Inhalt der QuelleChang, R. S. F., S. Sengupta, L. B. Shaw und N. Djeu. „Laser-heated pedestal growth: a viable technique for laser material evaluation studies“. In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1989. http://dx.doi.org/10.1364/oam.1989.tuu21.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Key agreement techniques"
Greenberg, Jane, Samantha Grabus, Florence Hudson, Tim Kraska, Samuel Madden, René Bastón und Katie Naum. The Northeast Big Data Innovation Hub: "Enabling Seamless Data Sharing in Industry and Academia" Workshop Report. Drexel University, März 2017. http://dx.doi.org/10.17918/d8159v.
Der volle Inhalt der Quelle