Journal articles on the topic 'Strong Key Agreement Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Strong Key Agreement Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alimoradi, Reza. "A new certificateless multiple key agreement scheme." Discrete Mathematics, Algorithms and Applications 09, no. 01 (February 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Full textSun, Mei, Yuyan Guo, Dongbing Zhang, and MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks." Complexity 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Full textCao, Liling, Mei Liang, Zheng Zhang, and Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC." Wireless Communications and Mobile Computing 2022 (December 5, 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Full textZhang, Li Hua, Li Ping Zhang, and Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme." Advanced Materials Research 108-111 (May 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Full textZhang, Yuanyuan, and Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems." PLOS ONE 16, no. 4 (April 26, 2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Full textGong, Xiang, and Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things." Sensors 22, no. 19 (September 22, 2022): 7191. http://dx.doi.org/10.3390/s22197191.
Full textChandrakar, Preeti, and Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme." International Journal of Business Data Communications and Networking 12, no. 2 (July 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Full textZahednejad, Behnam, Huang Teng, Saeed Kosari, and Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability." International Journal of Intelligent Systems 2023 (April 29, 2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Full textMao, Deming, Ling Zhang, Xiaoyu Li, and Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Full textAbderrezzak, Sebbah, and Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts." International Journal of Technology Diffusion 13, no. 1 (January 1, 2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Full textGope, Prosanta, and Tzonelih Hwang. "An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks." Journal of Network and Computer Applications 62 (February 2016): 1–8. http://dx.doi.org/10.1016/j.jnca.2015.12.003.
Full textMarr, Simon, and Johannes Enzmann. "Moving Towards Phase III—Key Elements of the Review of the EU Emissions Trading Scheme." Journal for European Environmental & Planning Law 5, no. 2 (2008): 159–81. http://dx.doi.org/10.1163/161372708x324178.
Full textZhou, Yousheng, Junfeng Zhou, Feng Wang, and Feng Guo. "An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity." Applied Computational Intelligence and Soft Computing 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/3916942.
Full textKim, HyunGon, and Jong-Hyouk Lee. "Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6." Mobile Information Systems 6, no. 1 (2010): 107–21. http://dx.doi.org/10.1155/2010/934286.
Full textXu, Xiang, Yu Wang, Xue-Dian Zhang, and Min-Shan Jiang. "A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server." Security and Communication Networks 2023 (April 17, 2023): 1–9. http://dx.doi.org/10.1155/2023/1164728.
Full textHolsti, Ole R. "Toward an Operational Definition of Consensus." American Review of Politics 14 (November 1, 1993): 309–39. http://dx.doi.org/10.15763/issn.2374-7781.1993.14.0.309-339.
Full textTan, Zuowen. "Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials." Security and Communication Networks 2021 (June 2, 2021): 1–21. http://dx.doi.org/10.1155/2021/6697898.
Full textBregman, B., E. Meijer, and R. Scheele. "Key aspects of stratospheric tracer modeling using assimilated winds." Atmospheric Chemistry and Physics 6, no. 12 (October 6, 2006): 4529–43. http://dx.doi.org/10.5194/acp-6-4529-2006.
Full textChen, Sifei, Chang Liu, Shaohang Xu, Yuanhao Li, Jiale Wang, Yanhui Wang, Ying Liu, and Wenhai Jiao. "Beam optics analysis on magnetic-state-selected atomic clocks with optical detection." Journal of Applied Physics 131, no. 11 (March 21, 2022): 114401. http://dx.doi.org/10.1063/5.0083473.
Full textAgbemabiese, Y. K., A.-G. Shaibu, and V. D. Gbedzi. "Validation of Aquacrop for Different Irrigation Regimes of Onion (Allium Cepa) in Bontanga Irrigation Scheme." International Journal of Irrigation and Agricultural Development (IJIRAD) 1, no. 1 (January 25, 2018): 1–12. http://dx.doi.org/10.47762/2017.964x.19.
Full textRío-Martín, Laura, Saray Busto, and Michael Dumbser. "A Massively Parallel Hybrid Finite Volume/Finite Element Scheme for Computational Fluid Dynamics." Mathematics 9, no. 18 (September 18, 2021): 2316. http://dx.doi.org/10.3390/math9182316.
Full textWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin, and G. Lohmann. "Glacial–interglacial changes in H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled ECHAM5/MPI-OM Earth system model." Geoscientific Model Development 9, no. 2 (February 17, 2016): 647–70. http://dx.doi.org/10.5194/gmd-9-647-2016.
Full textWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin, and G. Lohmann. "Glacial–interglacial changes of H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled Earth System Model ECHAM5/MPI-OM." Geoscientific Model Development Discussions 8, no. 10 (October 16, 2015): 8835–94. http://dx.doi.org/10.5194/gmdd-8-8835-2015.
Full textWalker, Neil. "Taking Constitutionalism beyond the State." Political Studies 56, no. 3 (October 2008): 519–43. http://dx.doi.org/10.1111/j.1467-9248.2008.00749.x.
Full textSchüller, T., and B. Lauke. "Finite-Element-Simulation of Interfacial Crack Propagation: Cross-Check of Simulation Results with the Essential Work of Interfacial Fracture Method." Key Engineering Materials 312 (June 2006): 9–14. http://dx.doi.org/10.4028/www.scientific.net/kem.312.9.
Full textRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (February 2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Full textPetković, Veljko, and Christian D. Kummerow. "Performance of the GPM Passive Microwave Retrieval in the Balkan Flood Event of 2014." Journal of Hydrometeorology 16, no. 6 (November 17, 2015): 2501–18. http://dx.doi.org/10.1175/jhm-d-15-0018.1.
Full textHölzl, Michael, Endalkachew Asnake, Rene Mayrhofer, and Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.
Full textCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin, and N. A. Scott. "A new insight on tropospheric methane in the Tropics – first year from IASI hyperspectral infrared observations." Atmospheric Chemistry and Physics Discussions 9, no. 2 (March 12, 2009): 6855–87. http://dx.doi.org/10.5194/acpd-9-6855-2009.
Full textCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin, and N. A. Scott. "Tropospheric methane in the tropics – first year from IASI hyperspectral infrared observations." Atmospheric Chemistry and Physics 9, no. 17 (September 2, 2009): 6337–50. http://dx.doi.org/10.5194/acp-9-6337-2009.
Full textMarshall, Aniqa Islam, Woranan Witthayapipopsakul, Somtanuek Chotchoungchatchai, Waritta Wangbanjongkun, and Viroj Tangcharoensathien. "Contracting the private health sector in Thailand’s Universal Health Coverage." PLOS Global Public Health 3, no. 4 (April 28, 2023): e0000799. http://dx.doi.org/10.1371/journal.pgph.0000799.
Full textCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante, and N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations." Atmospheric Chemistry and Physics 9, no. 14 (July 21, 2009): 4797–810. http://dx.doi.org/10.5194/acp-9-4797-2009.
Full textBlundo, C. "A -restricted key agreement scheme." Computer Journal 42, no. 1 (January 1, 1999): 51–61. http://dx.doi.org/10.1093/comjnl/42.1.51.
Full textCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante, and N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations." Atmospheric Chemistry and Physics Discussions 9, no. 2 (March 27, 2009): 8187–222. http://dx.doi.org/10.5194/acpd-9-8187-2009.
Full textLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo, et al. "WRF-chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on nighttime chemistry over north-western Europe." Atmospheric Chemistry and Physics Discussions 14, no. 14 (August 13, 2014): 20883–943. http://dx.doi.org/10.5194/acpd-14-20883-2014.
Full textLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo, et al. "WRF-Chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on night-time chemistry over north-western Europe." Atmospheric Chemistry and Physics 15, no. 3 (February 9, 2015): 1385–409. http://dx.doi.org/10.5194/acp-15-1385-2015.
Full textLi, Na, Yun-wei Dong, Yu-Chen Zhang, and Tian-Wei Che. "Enhanced Security Certificateless Key Agreement Scheme Design." International Journal of Security and Its Applications 9, no. 12 (December 31, 2015): 77–84. http://dx.doi.org/10.14257/ijsia.2015.9.12.09.
Full textToğay, Cengiz. "A practical key agreement scheme for videoconferencing." Multimedia Tools and Applications 79, no. 33-34 (June 12, 2020): 23711–28. http://dx.doi.org/10.1007/s11042-020-09136-6.
Full textZhang, Silan, Jianhua Chen, Jingbo Xia, and Xiaochuan Ai. "An XTR-Based Constant Round Key Agreement Scheme." Mathematical Problems in Engineering 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/596868.
Full textChen, Li Qing, Cheng Fu Sun, and Cheng Jie Xu. "An Authenticated Group Key Agreement Scheme for Wireless Sensor Networks Based on Bilinear Pairings." Advanced Materials Research 846-847 (November 2013): 876–82. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.876.
Full textLiu, Ping, Syed Hamad Shirazi, Wei Liu, and Yong Xie. "pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud." Security and Communication Networks 2021 (October 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/6571700.
Full textWang, Jun, Yue Chen, Gang Yang, Hong Yong Jia, and Ju Long Lan. "Multi-Factor Identity Authenticated Key Agreement Protocol." Applied Mechanics and Materials 556-562 (May 2014): 5597–602. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5597.
Full textHao, Zhuo, Sheng Zhong, and Nenghai Yu. "A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics." Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/935604.
Full textLEE, CHENG-CHI, CHUN-TA LI, KUO-YOU HUANG, and SHIOW-YUAN HUANG. "AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES." Journal of Circuits, Systems and Computers 20, no. 04 (June 2011): 697–707. http://dx.doi.org/10.1142/s0218126611007554.
Full textDENG, Fei, and Jun HE. "Multi-key agreement protocol based on signature scheme." Journal of Computer Applications 32, no. 12 (May 30, 2013): 3456–57. http://dx.doi.org/10.3724/sp.j.1087.2012.03456.
Full textCHEN, Li-qing. "Efficient key agreement scheme for dynamic secure multicast." Journal of Computer Applications 28, no. 8 (August 20, 2008): 1943–45. http://dx.doi.org/10.3724/sp.j.1087.2008.01943.
Full textChain, Kai, Wen-Chung Kuo, and Kuei-Hu Chang. "Enhancement key agreement scheme based on chaotic maps." International Journal of Computers and Applications 37, no. 2 (April 3, 2015): 67–72. http://dx.doi.org/10.1080/1206212x.2015.1088211.
Full textPraveen, I., K. Rajeev, and M. Sethumadhavan. "An Authenticated Key Agreement Scheme using Vector Decomposition." Defence Science Journal 66, no. 6 (October 31, 2016): 594. http://dx.doi.org/10.14429/dsj.66.10799.
Full textKim, Kee-Won, Eun-Kyung Ryu, and Kee-Young Yoo. "Cryptanalysis of Lee–Lee authenticated key agreement scheme." Applied Mathematics and Computation 163, no. 1 (April 2005): 193–98. http://dx.doi.org/10.1016/j.amc.2004.01.031.
Full textLee, Keon-Jik, and Byeong-Jik Lee. "Cryptanalysis of the modified authenticated key agreement scheme." Applied Mathematics and Computation 170, no. 1 (November 2005): 280–84. http://dx.doi.org/10.1016/j.amc.2004.11.042.
Full text