Gotowa bibliografia na temat „Non-Interactive Key Agreement”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Non-Interactive Key Agreement”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Non-Interactive Key Agreement"

1

Yongxuan Sang, Lili Zhang, Lin You i Zhongwen Li. "Two Non-interactive Key Agreement Protocols under Certificateless Scenarios". International Journal of Advancements in Computing Technology 4, nr 6 (15.04.2012): 331–37. http://dx.doi.org/10.4156/ijact.vol4.issue6.38.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Guo, Hua, Yi Mu, Zhoujun Li i Xiyong Zhang. "An efficient and non-interactive hierarchical key agreement protocol". Computers & Security 30, nr 1 (styczeń 2011): 28–34. http://dx.doi.org/10.1016/j.cose.2010.10.003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kim, Hyunsung. "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS". Sensors 14, nr 12 (10.12.2014): 23742–57. http://dx.doi.org/10.3390/s141223742.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wu, Tzong-Sun, i Han-Yu Lin. "Non-Interactive Authenticated Key Agreement over the Mobile Communication Network". Mobile Networks and Applications 18, nr 5 (27.04.2013): 594–99. http://dx.doi.org/10.1007/s11036-013-0440-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Cheng, Jiin-Chiou, i Chi-Sung Laih. "Conference key agreement protocol with non-interactive fault-tolerance over broadcast network". International Journal of Information Security 8, nr 1 (16.09.2008): 37–48. http://dx.doi.org/10.1007/s10207-008-0062-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhu, Guobin, Hu Xiong i Zhiguang Qin. "On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol". Wireless Personal Communications 74, nr 2 (23.07.2013): 883–89. http://dx.doi.org/10.1007/s11277-013-1328-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Bala, Suman, i Anil K. Verma. "A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks". International Journal of Ad Hoc and Ubiquitous Computing 21, nr 2 (2016): 140. http://dx.doi.org/10.1504/ijahuc.2016.075187.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Alimoradi, Reza, Fateme Amjadi, Seiied-Mohammad-Javad Razavian i M. H. Noorallahzadeh. "A Modified Hierarchical Multiple Key Agreement Scheme for WSN". International Journal of Advanced Networking and Applications 14, nr 03 (2022): 5493–98. http://dx.doi.org/10.35444/ijana.2022.14312.

Pełny tekst źródła
Streszczenie:
Nowadays, sensor networks are one of the hottest scientific issues. A lot of research has been done to improve their efficiency. Wireless Sensor Networks (WSN) are applied as an important and efficient technology in many industries such as military operations, security systems, intelligent transportation systems, medics, agriculture, and many others. Key agreement is a challenging point in the security of these networks. Sensor nodes connect to each other using cryptography techniques, however, use of the classic key management techniques such as key distribution center is inefficient because of resource-constrained nature of the sensor nodes. This paper proposes a hierarchical multiple key agreement scheme. In the proposed scheme, two nodes can produce multiple session keys, just with only one run of the key agreement protocol by two nodes in the hierarchical system. As well as its efficiency, this new scheme is based on identity and non-interactive protocol. Being zero-knowledge proof is another advantage of the scheme.
Style APA, Harvard, Vancouver, ISO itp.
9

Chinniah, Porkodi, i Sangavai Krishnamoorthi. "An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks". European Journal of Engineering Research and Science 4, nr 6 (26.06.2019): 111–16. http://dx.doi.org/10.24018/ejers.2019.4.6.1316.

Pełny tekst źródła
Streszczenie:
Distributed Sensor Networks are broadly used in many applications and key distribution is a challenging task. In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field. Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed. The probability for connectivity of the network generated according to the proposed key distribution scheme is discussed in detail. The implementation of the proposed scheme is done using NetSim interfaced with MATLAB. Connectivity of the network is also checked through eigenvalues of the Laplacian matrix of the network.
Style APA, Harvard, Vancouver, ISO itp.
10

Chinniah, Porkodi, i Sangavai Krishnamoorthi. "An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks". European Journal of Engineering and Technology Research 4, nr 6 (26.06.2019): 111–16. http://dx.doi.org/10.24018/ejeng.2019.4.6.1316.

Pełny tekst źródła
Streszczenie:
Distributed Sensor Networks are broadly used in many applications and key distribution is a challenging task. In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field. Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed. The probability for connectivity of the network generated according to the proposed key distribution scheme is discussed in detail. The implementation of the proposed scheme is done using NetSim interfaced with MATLAB. Connectivity of the network is also checked through eigenvalues of the Laplacian matrix of the network.
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Non-Interactive Key Agreement"

1

Sarkar, Pinaki. "Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)". W Network and System Security, 315–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gennaro, Rosario, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt i Stephen D. Wolthusen. "Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs". W Computer Security - ESORICS 2008, 49–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kim, Hyunsung. "Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks". W Communications in Computer and Information Science, 86–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Non-Interactive Key Agreement"

1

Yang, Deming, Dejun Mu i Zhong Xu. "A non-interactive and efficient key agreement protocol for ASNs". W Second International Conference on Spatial Information Technology, redaktorzy Cheng Wang, Shan Zhong i Jiaolong Wei. SPIE, 2007. http://dx.doi.org/10.1117/12.773757.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kalaiselvi, S., i S. Jabeen Begum. "A secure group communication using non-interactive key computation in multiparty key agreement". W ICCCN 2008. 17th International Conference on Computing, Communication and Networking. IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787758.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Xing, Qianqian, Baosheng Wang, Xiaofeng Wang, Jing Tao i Liu Liu. "A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks". W 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.224.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii