Artículos de revistas sobre el tema "Strong Key Agreement Scheme"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Strong Key Agreement Scheme".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Alimoradi, Reza. "A new certificateless multiple key agreement scheme". Discrete Mathematics, Algorithms and Applications 09, n.º 01 (febrero de 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Texto completoSun, Mei, Yuyan Guo, Dongbing Zhang y MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks". Complexity 2021 (4 de mayo de 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Texto completoCao, Liling, Mei Liang, Zheng Zhang y Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC". Wireless Communications and Mobile Computing 2022 (5 de diciembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Texto completoZhang, Li Hua, Li Ping Zhang y Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme". Advanced Materials Research 108-111 (mayo de 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Texto completoZhang, Yuanyuan y Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems". PLOS ONE 16, n.º 4 (26 de abril de 2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Texto completoGong, Xiang y Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things". Sensors 22, n.º 19 (22 de septiembre de 2022): 7191. http://dx.doi.org/10.3390/s22197191.
Texto completoChandrakar, Preeti y Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme". International Journal of Business Data Communications and Networking 12, n.º 2 (julio de 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Texto completoZahednejad, Behnam, Huang Teng, Saeed Kosari y Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability". International Journal of Intelligent Systems 2023 (29 de abril de 2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Texto completoMao, Deming, Ling Zhang, Xiaoyu Li y Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System". Wireless Communications and Mobile Computing 2018 (29 de julio de 2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Texto completoAbderrezzak, Sebbah y Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts". International Journal of Technology Diffusion 13, n.º 1 (1 de enero de 2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Texto completoGope, Prosanta y Tzonelih Hwang. "An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks". Journal of Network and Computer Applications 62 (febrero de 2016): 1–8. http://dx.doi.org/10.1016/j.jnca.2015.12.003.
Texto completoMarr, Simon y Johannes Enzmann. "Moving Towards Phase III—Key Elements of the Review of the EU Emissions Trading Scheme". Journal for European Environmental & Planning Law 5, n.º 2 (2008): 159–81. http://dx.doi.org/10.1163/161372708x324178.
Texto completoZhou, Yousheng, Junfeng Zhou, Feng Wang y Feng Guo. "An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity". Applied Computational Intelligence and Soft Computing 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/3916942.
Texto completoKim, HyunGon y Jong-Hyouk Lee. "Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6". Mobile Information Systems 6, n.º 1 (2010): 107–21. http://dx.doi.org/10.1155/2010/934286.
Texto completoXu, Xiang, Yu Wang, Xue-Dian Zhang y Min-Shan Jiang. "A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server". Security and Communication Networks 2023 (17 de abril de 2023): 1–9. http://dx.doi.org/10.1155/2023/1164728.
Texto completoHolsti, Ole R. "Toward an Operational Definition of Consensus". American Review of Politics 14 (1 de noviembre de 1993): 309–39. http://dx.doi.org/10.15763/issn.2374-7781.1993.14.0.309-339.
Texto completoTan, Zuowen. "Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials". Security and Communication Networks 2021 (2 de junio de 2021): 1–21. http://dx.doi.org/10.1155/2021/6697898.
Texto completoBregman, B., E. Meijer y R. Scheele. "Key aspects of stratospheric tracer modeling using assimilated winds". Atmospheric Chemistry and Physics 6, n.º 12 (6 de octubre de 2006): 4529–43. http://dx.doi.org/10.5194/acp-6-4529-2006.
Texto completoChen, Sifei, Chang Liu, Shaohang Xu, Yuanhao Li, Jiale Wang, Yanhui Wang, Ying Liu y Wenhai Jiao. "Beam optics analysis on magnetic-state-selected atomic clocks with optical detection". Journal of Applied Physics 131, n.º 11 (21 de marzo de 2022): 114401. http://dx.doi.org/10.1063/5.0083473.
Texto completoAgbemabiese, Y. K., A.-G. Shaibu y V. D. Gbedzi. "Validation of Aquacrop for Different Irrigation Regimes of Onion (Allium Cepa) in Bontanga Irrigation Scheme". International Journal of Irrigation and Agricultural Development (IJIRAD) 1, n.º 1 (25 de enero de 2018): 1–12. http://dx.doi.org/10.47762/2017.964x.19.
Texto completoRío-Martín, Laura, Saray Busto y Michael Dumbser. "A Massively Parallel Hybrid Finite Volume/Finite Element Scheme for Computational Fluid Dynamics". Mathematics 9, n.º 18 (18 de septiembre de 2021): 2316. http://dx.doi.org/10.3390/math9182316.
Texto completoWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin y G. Lohmann. "Glacial–interglacial changes in H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled ECHAM5/MPI-OM Earth system model". Geoscientific Model Development 9, n.º 2 (17 de febrero de 2016): 647–70. http://dx.doi.org/10.5194/gmd-9-647-2016.
Texto completoWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin y G. Lohmann. "Glacial–interglacial changes of H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled Earth System Model ECHAM5/MPI-OM". Geoscientific Model Development Discussions 8, n.º 10 (16 de octubre de 2015): 8835–94. http://dx.doi.org/10.5194/gmdd-8-8835-2015.
Texto completoWalker, Neil. "Taking Constitutionalism beyond the State". Political Studies 56, n.º 3 (octubre de 2008): 519–43. http://dx.doi.org/10.1111/j.1467-9248.2008.00749.x.
Texto completoSchüller, T. y B. Lauke. "Finite-Element-Simulation of Interfacial Crack Propagation: Cross-Check of Simulation Results with the Essential Work of Interfacial Fracture Method". Key Engineering Materials 312 (junio de 2006): 9–14. http://dx.doi.org/10.4028/www.scientific.net/kem.312.9.
Texto completoRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION". International Journal of Quantum Information 06, n.º 01 (febrero de 2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Texto completoPetković, Veljko y Christian D. Kummerow. "Performance of the GPM Passive Microwave Retrieval in the Balkan Flood Event of 2014". Journal of Hydrometeorology 16, n.º 6 (17 de noviembre de 2015): 2501–18. http://dx.doi.org/10.1175/jhm-d-15-0018.1.
Texto completoHölzl, Michael, Endalkachew Asnake, Rene Mayrhofer y Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication". International Journal of Pervasive Computing and Communications 11, n.º 4 (2 de noviembre de 2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.
Texto completoCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin y N. A. Scott. "A new insight on tropospheric methane in the Tropics – first year from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics Discussions 9, n.º 2 (12 de marzo de 2009): 6855–87. http://dx.doi.org/10.5194/acpd-9-6855-2009.
Texto completoCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin y N. A. Scott. "Tropospheric methane in the tropics – first year from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics 9, n.º 17 (2 de septiembre de 2009): 6337–50. http://dx.doi.org/10.5194/acp-9-6337-2009.
Texto completoMarshall, Aniqa Islam, Woranan Witthayapipopsakul, Somtanuek Chotchoungchatchai, Waritta Wangbanjongkun y Viroj Tangcharoensathien. "Contracting the private health sector in Thailand’s Universal Health Coverage". PLOS Global Public Health 3, n.º 4 (28 de abril de 2023): e0000799. http://dx.doi.org/10.1371/journal.pgph.0000799.
Texto completoCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante y N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics 9, n.º 14 (21 de julio de 2009): 4797–810. http://dx.doi.org/10.5194/acp-9-4797-2009.
Texto completoBlundo, C. "A -restricted key agreement scheme". Computer Journal 42, n.º 1 (1 de enero de 1999): 51–61. http://dx.doi.org/10.1093/comjnl/42.1.51.
Texto completoCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante y N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics Discussions 9, n.º 2 (27 de marzo de 2009): 8187–222. http://dx.doi.org/10.5194/acpd-9-8187-2009.
Texto completoLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo et al. "WRF-chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on nighttime chemistry over north-western Europe". Atmospheric Chemistry and Physics Discussions 14, n.º 14 (13 de agosto de 2014): 20883–943. http://dx.doi.org/10.5194/acpd-14-20883-2014.
Texto completoLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo et al. "WRF-Chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on night-time chemistry over north-western Europe". Atmospheric Chemistry and Physics 15, n.º 3 (9 de febrero de 2015): 1385–409. http://dx.doi.org/10.5194/acp-15-1385-2015.
Texto completoLi, Na, Yun-wei Dong, Yu-Chen Zhang y Tian-Wei Che. "Enhanced Security Certificateless Key Agreement Scheme Design". International Journal of Security and Its Applications 9, n.º 12 (31 de diciembre de 2015): 77–84. http://dx.doi.org/10.14257/ijsia.2015.9.12.09.
Texto completoToğay, Cengiz. "A practical key agreement scheme for videoconferencing". Multimedia Tools and Applications 79, n.º 33-34 (12 de junio de 2020): 23711–28. http://dx.doi.org/10.1007/s11042-020-09136-6.
Texto completoZhang, Silan, Jianhua Chen, Jingbo Xia y Xiaochuan Ai. "An XTR-Based Constant Round Key Agreement Scheme". Mathematical Problems in Engineering 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/596868.
Texto completoChen, Li Qing, Cheng Fu Sun y Cheng Jie Xu. "An Authenticated Group Key Agreement Scheme for Wireless Sensor Networks Based on Bilinear Pairings". Advanced Materials Research 846-847 (noviembre de 2013): 876–82. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.876.
Texto completoLiu, Ping, Syed Hamad Shirazi, Wei Liu y Yong Xie. "pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud". Security and Communication Networks 2021 (18 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/6571700.
Texto completoWang, Jun, Yue Chen, Gang Yang, Hong Yong Jia y Ju Long Lan. "Multi-Factor Identity Authenticated Key Agreement Protocol". Applied Mechanics and Materials 556-562 (mayo de 2014): 5597–602. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5597.
Texto completoHao, Zhuo, Sheng Zhong y Nenghai Yu. "A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics". Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/935604.
Texto completoLEE, CHENG-CHI, CHUN-TA LI, KUO-YOU HUANG y SHIOW-YUAN HUANG. "AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES". Journal of Circuits, Systems and Computers 20, n.º 04 (junio de 2011): 697–707. http://dx.doi.org/10.1142/s0218126611007554.
Texto completoDENG, Fei y Jun HE. "Multi-key agreement protocol based on signature scheme". Journal of Computer Applications 32, n.º 12 (30 de mayo de 2013): 3456–57. http://dx.doi.org/10.3724/sp.j.1087.2012.03456.
Texto completoCHEN, Li-qing. "Efficient key agreement scheme for dynamic secure multicast". Journal of Computer Applications 28, n.º 8 (20 de agosto de 2008): 1943–45. http://dx.doi.org/10.3724/sp.j.1087.2008.01943.
Texto completoChain, Kai, Wen-Chung Kuo y Kuei-Hu Chang. "Enhancement key agreement scheme based on chaotic maps". International Journal of Computers and Applications 37, n.º 2 (3 de abril de 2015): 67–72. http://dx.doi.org/10.1080/1206212x.2015.1088211.
Texto completoPraveen, I., K. Rajeev y M. Sethumadhavan. "An Authenticated Key Agreement Scheme using Vector Decomposition". Defence Science Journal 66, n.º 6 (31 de octubre de 2016): 594. http://dx.doi.org/10.14429/dsj.66.10799.
Texto completoKim, Kee-Won, Eun-Kyung Ryu y Kee-Young Yoo. "Cryptanalysis of Lee–Lee authenticated key agreement scheme". Applied Mathematics and Computation 163, n.º 1 (abril de 2005): 193–98. http://dx.doi.org/10.1016/j.amc.2004.01.031.
Texto completoLee, Keon-Jik y Byeong-Jik Lee. "Cryptanalysis of the modified authenticated key agreement scheme". Applied Mathematics and Computation 170, n.º 1 (noviembre de 2005): 280–84. http://dx.doi.org/10.1016/j.amc.2004.11.042.
Texto completo