Journal articles on the topic 'Secure Channel Protocol (SCP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Channel Protocol (SCP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
WANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT A PRE-ESTABLISHED SECURE QUANTUM CHANNEL." International Journal of Quantum Information 04, no. 06 (December 2006): 925–34. http://dx.doi.org/10.1142/s0219749906002304.
Full textRubel, Paul, Jocelyne Fayn, Peter W. Macfarlane, Danilo Pani, Alois Schlögl, and Alpo Värri. "The History and Challenges of SCP-ECG: The Standard Communication Protocol for Computer-Assisted Electrocardiography." Hearts 2, no. 3 (August 24, 2021): 384–409. http://dx.doi.org/10.3390/hearts2030031.
Full textWANG, JIAN, QUAN ZHANG, and CHAOJING TANG. "QUANTUM SECURE DIRECT COMMUNICATION WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Modern Physics C 17, no. 05 (May 2006): 685–92. http://dx.doi.org/10.1142/s0129183106009011.
Full textShen, Dongsu, Wenping Ma, Meiling Wang, and Xunru Yin. "Improvement of a controlled quantum secure direct communication protocol." Modern Physics Letters B 28, no. 15 (June 17, 2014): 1450121. http://dx.doi.org/10.1142/s0217984914501218.
Full textSun, Yi, Qiaoyan Wen, Yudong Zhang, Hua Zhang, and Zhengping Jin. "Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/172718.
Full textHarun, Nur Ziadah, Zuriati Ahmad Zukarnain, Zurina Mohd Hanapi, and Idawaty Ahmad. "Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key." Symmetry 12, no. 9 (September 9, 2020): 1481. http://dx.doi.org/10.3390/sym12091481.
Full textFu, Min Cang, and Jia Chen Wang. "Efficient and Secure Two-Way Asynchronous Quantum Secure Direct Communication Protocol by Using Entangled States." Applied Mechanics and Materials 135-136 (October 2011): 1171–78. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1171.
Full textZhong, Jingxiang. "Network Communication Data Encryption Method Based on Wireless Channel Characteristics." International Journal of Circuits, Systems and Signal Processing 15 (August 31, 2021): 1242–51. http://dx.doi.org/10.46300/9106.2021.15.135.
Full textGünther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (December 16, 2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.
Full textXIA, YAN, JIE SONG, and HE-SHAN SONG. "PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION." International Journal of Quantum Information 06, no. 03 (June 2008): 463–70. http://dx.doi.org/10.1142/s0219749908003682.
Full textWang, Hung-Wen, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, and Chun-Wei Yang. "Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack." Mathematics 10, no. 8 (April 10, 2022): 1241. http://dx.doi.org/10.3390/math10081241.
Full textLiu, Qiao, Hui Li, and Yong Wang. "General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel." Entropy 21, no. 11 (October 28, 2019): 1054. http://dx.doi.org/10.3390/e21111054.
Full textBebrov, Georgi, and Rozalina Dimova. "Efficient Quantum Secure Direct Communication Protocol Based on Quantum Channel Compression." International Journal of Theoretical Physics 59, no. 2 (December 14, 2019): 426–35. http://dx.doi.org/10.1007/s10773-019-04336-9.
Full textWang, Meiling, Wenping Ma, Dongsu Shen, and Xunru Yin. "A new controlled quantum secure direct communication protocol based on a four-qubit cluster state." Modern Physics Letters B 28, no. 24 (September 20, 2014): 1450194. http://dx.doi.org/10.1142/s0217984914501942.
Full textLi, Xiao Yu, and Wei Mei Zhi. "Quantum Information Delay Protocol Using Entanglement Swapping." Advanced Materials Research 569 (September 2012): 657–61. http://dx.doi.org/10.4028/www.scientific.net/amr.569.657.
Full textWei, Yu-Yan, Zi-Kai Gao, Si-Ying Wang, Ya-Jing Zhu, and Tao Li. "Deterministic secure quantum communication with double-encoded single photons." Acta Physica Sinica 71, no. 5 (2022): 050302. http://dx.doi.org/10.7498/aps.71.20210907.
Full textLIU, YI-MIN, DONG WANG, XIAN-SONG LIU, and ZHAN-JUN ZHANG. "REVISITING NASERI'S SECURE QUANTUM SEALED-BID AUCTION." International Journal of Quantum Information 07, no. 06 (September 2009): 1295–301. http://dx.doi.org/10.1142/s0219749909005808.
Full textHölzl, Michael, Endalkachew Asnake, Rene Mayrhofer, and Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.
Full textGAO, FEI, SU-JUAN QIN, QIAO-YAN WEN, and FU-CHEN ZHU. "CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL." International Journal of Quantum Information 10, no. 04 (June 2012): 1250054. http://dx.doi.org/10.1142/s0219749912500542.
Full textChou, Yao-Hsin, Yu-Ting Lin, Guo-Jyun Zeng, Fang-Jhu Lin, and Chi-Yuan Chen. "Controlled Bidirectional Quantum Secure Direct Communication." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/694798.
Full textLucamarini, Marco, Alessandro Ceré, Giovanni Di Giuseppe, Stefano Mancini, David Vitali, and Paolo Tombesi. "Two-Way Protocol with Imperfect Devices." Open Systems & Information Dynamics 14, no. 02 (June 2007): 169–78. http://dx.doi.org/10.1007/s11080-007-9045-3.
Full textDONG, HAI-KUAN, LI DONG, XIAO-MING XIU, and YA-JUN GAO. "A DETERMINISTIC SECURE QUANTUM COMMUNICATION PROTOCOL THROUGH A COLLECTIVE ROTATION NOISE CHANNEL." International Journal of Quantum Information 08, no. 08 (December 2010): 1389–95. http://dx.doi.org/10.1142/s0219749910006460.
Full textYang, Chou-Chen, Yuan-Liang Tang, Ren-Chiun Wang, and Hung-Wen Yang. "A secure and efficient authentication protocol for anonymous channel in wireless communications." Applied Mathematics and Computation 169, no. 2 (October 2005): 1431–39. http://dx.doi.org/10.1016/j.amc.2004.10.073.
Full textBanawan, Karim, and Sennur Ulukus. "Secure Degrees of Freedom in Networks with User Misbehavior." Entropy 21, no. 10 (September 26, 2019): 945. http://dx.doi.org/10.3390/e21100945.
Full textYu, SungJin, JoonYoung Lee, KyungKeun Lee, KiSung Park, and YoungHo Park. "Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications." Sensors 18, no. 10 (September 21, 2018): 3191. http://dx.doi.org/10.3390/s18103191.
Full textChauhan, S., and N. L. Gupta. "Bidirectional Quantum Secure Direct Communication Using Dense Coding of Four Qubit Cluster States." Journal of Scientific Research 14, no. 1 (January 1, 2022): 179–87. http://dx.doi.org/10.3329/jsr.v14i1.54479.
Full textYu, Chao, Yin Li, Jianzhi Ding, Yun Mao, and Ying Guo. "Photon subtraction-based continuous-variable measurement-device-independent quantum key distribution with discrete modulation over a fiber-to-water channel." Communications in Theoretical Physics 74, no. 3 (March 1, 2022): 035104. http://dx.doi.org/10.1088/1572-9494/ac5320.
Full textChandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.
Full textYin, Aihan, Weibin Lin, Kemeng He, Zhifei Han, and Ping Fan. "Controlled bidirectional quantum secure direct communication protocol based on Grover’s algorithm." Modern Physics Letters A 35, no. 28 (June 25, 2020): 2050228. http://dx.doi.org/10.1142/s0217732320502284.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textChen, Hsing-Chung, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei, and Chao-Ching Lee. "A secure e-mail protocol using ID-based FNS multicast mechanism." Computer Science and Information Systems 11, no. 3 (2014): 1091–112. http://dx.doi.org/10.2298/csis130924066c.
Full textAstafiev, A. V., and T. O. Shardin. "DATA EXCHANGE TECHNOLOGY BASED ON THE HANDSHAKE PROTOCOL FOR INDUSTRIAL AUTOMATION SYSTEM." Proceedings of the Southwest State University 22, no. 2 (April 28, 2018): 27–33. http://dx.doi.org/10.21869/2223-1560-2018-22-2-27-33.
Full textZheng Xiao-Yi and Long Yin-Xiang. "Cluster state based controlled quantum secure direct communication protocol with controllable channel capacity." Acta Physica Sinica 66, no. 18 (2017): 180303. http://dx.doi.org/10.7498/aps.66.180303.
Full textChen, Qingnan, Ting Wu, Chengnan Hu, Anbang Chen, and Qiuhua Zheng. "An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement." Information 12, no. 3 (March 5, 2021): 112. http://dx.doi.org/10.3390/info12030112.
Full textKinzel, W., A. Englert, and I. Kanter. "On chaos synchronization and secure communication." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 368, no. 1911 (January 28, 2010): 379–89. http://dx.doi.org/10.1098/rsta.2009.0230.
Full textYu, SungJin, KiSung Park, JoonYoung Lee, YoungHo Park, YoHan Park, SangWoo Lee, and BoHeung Chung. "Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment." Applied Sciences 10, no. 5 (March 4, 2020): 1758. http://dx.doi.org/10.3390/app10051758.
Full textYu, SungJin, JoonYoung Lee, YoHan Park, YoungHo Park, SangWoo Lee, and BoHeung Chung. "A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks." Applied Sciences 10, no. 10 (May 21, 2020): 3565. http://dx.doi.org/10.3390/app10103565.
Full textLi, Xiao Yu, and De Xi Zhang. "Information Delay Protocol Using Quantum Entangled States." Advanced Materials Research 204-210 (February 2011): 1274–78. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1274.
Full textRuan, Xinchao, Hang Zhang, Wei Zhao, Xiaoxue Wang, Xuan Li, and Ying Guo. "Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution over Seawater Channel." Applied Sciences 9, no. 22 (November 18, 2019): 4956. http://dx.doi.org/10.3390/app9224956.
Full textBai, Juan, Tao Dong, Qin Zhang, Shiqiang Wang, and Yanhong Lin. "Coordinated Beamforming for Secure Transmission in the Downlink Multicell MIMO Systems." Mathematical Problems in Engineering 2020 (May 20, 2020): 1–9. http://dx.doi.org/10.1155/2020/6930108.
Full textJoy, Shyam P., and Priya Chandran. "Towards a Secure Development Environment for Collaborative Applications." International Journal of e-Collaboration 15, no. 1 (January 2019): 1–20. http://dx.doi.org/10.4018/ijec.2019010101.
Full textLee, JoonYoung, SungJin Yu, KiSung Park, YoHan Park, and YoungHo Park. "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments." Sensors 19, no. 10 (May 22, 2019): 2358. http://dx.doi.org/10.3390/s19102358.
Full textYusoff, Zainatul Yushaniza Mohamed, Mohamad Khairi Ishak, and Lukman AB Rahim. "A java servlet based transaction broker for internet of things edge device communications." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 488–97. http://dx.doi.org/10.11591/eei.v11i1.3455.
Full textCHEN, XIU-BO, SHUAI YANG, GANG XU, YUAN SU, and YI-XIAN YANG. "CRYPTANALYSIS OF THE QUANTUM STATE SHARING PROTOCOL USING FOUR SETS OF W-CLASS STATES." International Journal of Quantum Information 11, no. 01 (February 2013): 1350010. http://dx.doi.org/10.1142/s021974991350010x.
Full textOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Full textLi, Leilei, Hengji Li, Chaoyang Li, Xiubo Chen, Yan Chang, Yuguang Yang, and Jian Li. "The security analysis of E91 protocol in collective-rotation noise channel." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877819. http://dx.doi.org/10.1177/1550147718778192.
Full textSankalp Singh Chauhan. "Over the Air Smart Card Update via Secure Channel Protocol & Universal E-Card." January 2021 7, no. 01 (January 4, 2021): 44–47. http://dx.doi.org/10.46501/ijmtst070110.
Full textXu, Shu-Jiang, Xiu-Bo Chen, Xin-Xin Niu, and Yi-Xian Yang. "A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme." Communications in Theoretical Physics 59, no. 5 (May 2013): 547–53. http://dx.doi.org/10.1088/0253-6102/59/5/05.
Full textLee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications." Security and Communication Networks 5, no. 12 (February 29, 2012): 1375–78. http://dx.doi.org/10.1002/sec.430.
Full textMa, Shuquan, Changhua Zhu, Dongxiao Quan, and Min Nie. "A Distributed Architecture for Secure Delegated Quantum Computation." Entropy 24, no. 6 (June 7, 2022): 794. http://dx.doi.org/10.3390/e24060794.
Full text