Artykuły w czasopismach na temat „Strong Key Agreement Scheme”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Strong Key Agreement Scheme”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Alimoradi, Reza. "A new certificateless multiple key agreement scheme". Discrete Mathematics, Algorithms and Applications 09, nr 01 (luty 2017): 1750002. http://dx.doi.org/10.1142/s1793830917500021.
Pełny tekst źródłaSun, Mei, Yuyan Guo, Dongbing Zhang i MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks". Complexity 2021 (4.05.2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Pełny tekst źródłaCao, Liling, Mei Liang, Zheng Zhang i Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC". Wireless Communications and Mobile Computing 2022 (5.12.2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Pełny tekst źródłaZhang, Li Hua, Li Ping Zhang i Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme". Advanced Materials Research 108-111 (maj 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Pełny tekst źródłaZhang, Yuanyuan, i Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems". PLOS ONE 16, nr 4 (26.04.2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Pełny tekst źródłaGong, Xiang, i Tao Feng. "Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things". Sensors 22, nr 19 (22.09.2022): 7191. http://dx.doi.org/10.3390/s22197191.
Pełny tekst źródłaChandrakar, Preeti, i Hari Om. "A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme". International Journal of Business Data Communications and Networking 12, nr 2 (lipiec 2016): 62–79. http://dx.doi.org/10.4018/ijbdcn.2016070104.
Pełny tekst źródłaZahednejad, Behnam, Huang Teng, Saeed Kosari i Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability". International Journal of Intelligent Systems 2023 (29.04.2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Pełny tekst źródłaMao, Deming, Ling Zhang, Xiaoyu Li i Dejun Mu. "Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System". Wireless Communications and Mobile Computing 2018 (29.07.2018): 1–16. http://dx.doi.org/10.1155/2018/7579161.
Pełny tekst źródłaAbderrezzak, Sebbah, i Kadri Benamar. "A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts". International Journal of Technology Diffusion 13, nr 1 (1.01.2022): 1–22. http://dx.doi.org/10.4018/ijtd.313643.
Pełny tekst źródłaGope, Prosanta, i Tzonelih Hwang. "An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks". Journal of Network and Computer Applications 62 (luty 2016): 1–8. http://dx.doi.org/10.1016/j.jnca.2015.12.003.
Pełny tekst źródłaMarr, Simon, i Johannes Enzmann. "Moving Towards Phase III—Key Elements of the Review of the EU Emissions Trading Scheme". Journal for European Environmental & Planning Law 5, nr 2 (2008): 159–81. http://dx.doi.org/10.1163/161372708x324178.
Pełny tekst źródłaZhou, Yousheng, Junfeng Zhou, Feng Wang i Feng Guo. "An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity". Applied Computational Intelligence and Soft Computing 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/3916942.
Pełny tekst źródłaKim, HyunGon, i Jong-Hyouk Lee. "Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6". Mobile Information Systems 6, nr 1 (2010): 107–21. http://dx.doi.org/10.1155/2010/934286.
Pełny tekst źródłaXu, Xiang, Yu Wang, Xue-Dian Zhang i Min-Shan Jiang. "A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server". Security and Communication Networks 2023 (17.04.2023): 1–9. http://dx.doi.org/10.1155/2023/1164728.
Pełny tekst źródłaHolsti, Ole R. "Toward an Operational Definition of Consensus". American Review of Politics 14 (1.11.1993): 309–39. http://dx.doi.org/10.15763/issn.2374-7781.1993.14.0.309-339.
Pełny tekst źródłaTan, Zuowen. "Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials". Security and Communication Networks 2021 (2.06.2021): 1–21. http://dx.doi.org/10.1155/2021/6697898.
Pełny tekst źródłaBregman, B., E. Meijer i R. Scheele. "Key aspects of stratospheric tracer modeling using assimilated winds". Atmospheric Chemistry and Physics 6, nr 12 (6.10.2006): 4529–43. http://dx.doi.org/10.5194/acp-6-4529-2006.
Pełny tekst źródłaChen, Sifei, Chang Liu, Shaohang Xu, Yuanhao Li, Jiale Wang, Yanhui Wang, Ying Liu i Wenhai Jiao. "Beam optics analysis on magnetic-state-selected atomic clocks with optical detection". Journal of Applied Physics 131, nr 11 (21.03.2022): 114401. http://dx.doi.org/10.1063/5.0083473.
Pełny tekst źródłaAgbemabiese, Y. K., A.-G. Shaibu i V. D. Gbedzi. "Validation of Aquacrop for Different Irrigation Regimes of Onion (Allium Cepa) in Bontanga Irrigation Scheme". International Journal of Irrigation and Agricultural Development (IJIRAD) 1, nr 1 (25.01.2018): 1–12. http://dx.doi.org/10.47762/2017.964x.19.
Pełny tekst źródłaRío-Martín, Laura, Saray Busto i Michael Dumbser. "A Massively Parallel Hybrid Finite Volume/Finite Element Scheme for Computational Fluid Dynamics". Mathematics 9, nr 18 (18.09.2021): 2316. http://dx.doi.org/10.3390/math9182316.
Pełny tekst źródłaWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin i G. Lohmann. "Glacial–interglacial changes in H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled ECHAM5/MPI-OM Earth system model". Geoscientific Model Development 9, nr 2 (17.02.2016): 647–70. http://dx.doi.org/10.5194/gmd-9-647-2016.
Pełny tekst źródłaWerner, M., B. Haese, X. Xu, X. Zhang, M. Butzin i G. Lohmann. "Glacial–interglacial changes of H<sub>2</sub><sup>18</sup>O, HDO and deuterium excess – results from the fully coupled Earth System Model ECHAM5/MPI-OM". Geoscientific Model Development Discussions 8, nr 10 (16.10.2015): 8835–94. http://dx.doi.org/10.5194/gmdd-8-8835-2015.
Pełny tekst źródłaWalker, Neil. "Taking Constitutionalism beyond the State". Political Studies 56, nr 3 (październik 2008): 519–43. http://dx.doi.org/10.1111/j.1467-9248.2008.00749.x.
Pełny tekst źródłaSchüller, T., i B. Lauke. "Finite-Element-Simulation of Interfacial Crack Propagation: Cross-Check of Simulation Results with the Essential Work of Interfacial Fracture Method". Key Engineering Materials 312 (czerwiec 2006): 9–14. http://dx.doi.org/10.4028/www.scientific.net/kem.312.9.
Pełny tekst źródłaRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION". International Journal of Quantum Information 06, nr 01 (luty 2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Pełny tekst źródłaPetković, Veljko, i Christian D. Kummerow. "Performance of the GPM Passive Microwave Retrieval in the Balkan Flood Event of 2014". Journal of Hydrometeorology 16, nr 6 (17.11.2015): 2501–18. http://dx.doi.org/10.1175/jhm-d-15-0018.1.
Pełny tekst źródłaHölzl, Michael, Endalkachew Asnake, Rene Mayrhofer i Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication". International Journal of Pervasive Computing and Communications 11, nr 4 (2.11.2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.
Pełny tekst źródłaCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin i N. A. Scott. "A new insight on tropospheric methane in the Tropics – first year from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics Discussions 9, nr 2 (12.03.2009): 6855–87. http://dx.doi.org/10.5194/acpd-9-6855-2009.
Pełny tekst źródłaCrevoisier, C., D. Nobileau, A. M. Fiore, R. Armante, A. Chédin i N. A. Scott. "Tropospheric methane in the tropics – first year from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics 9, nr 17 (2.09.2009): 6337–50. http://dx.doi.org/10.5194/acp-9-6337-2009.
Pełny tekst źródłaMarshall, Aniqa Islam, Woranan Witthayapipopsakul, Somtanuek Chotchoungchatchai, Waritta Wangbanjongkun i Viroj Tangcharoensathien. "Contracting the private health sector in Thailand’s Universal Health Coverage". PLOS Global Public Health 3, nr 4 (28.04.2023): e0000799. http://dx.doi.org/10.1371/journal.pgph.0000799.
Pełny tekst źródłaCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante i N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics 9, nr 14 (21.07.2009): 4797–810. http://dx.doi.org/10.5194/acp-9-4797-2009.
Pełny tekst źródłaBlundo, C. "A -restricted key agreement scheme". Computer Journal 42, nr 1 (1.01.1999): 51–61. http://dx.doi.org/10.1093/comjnl/42.1.51.
Pełny tekst źródłaCrevoisier, C., A. Chédin, H. Matsueda, T. Machida, R. Armante i N. A. Scott. "First year of upper tropospheric integrated content of CO<sub>2</sub> from IASI hyperspectral infrared observations". Atmospheric Chemistry and Physics Discussions 9, nr 2 (27.03.2009): 8187–222. http://dx.doi.org/10.5194/acpd-9-8187-2009.
Pełny tekst źródłaLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo i in. "WRF-chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on nighttime chemistry over north-western Europe". Atmospheric Chemistry and Physics Discussions 14, nr 14 (13.08.2014): 20883–943. http://dx.doi.org/10.5194/acpd-14-20883-2014.
Pełny tekst źródłaLowe, D., S. Archer-Nicholls, W. Morgan, J. Allan, S. Utembe, B. Ouyang, E. Aruffo i in. "WRF-Chem model predictions of the regional impacts of N<sub>2</sub>O<sub>5</sub> heterogeneous processes on night-time chemistry over north-western Europe". Atmospheric Chemistry and Physics 15, nr 3 (9.02.2015): 1385–409. http://dx.doi.org/10.5194/acp-15-1385-2015.
Pełny tekst źródłaLi, Na, Yun-wei Dong, Yu-Chen Zhang i Tian-Wei Che. "Enhanced Security Certificateless Key Agreement Scheme Design". International Journal of Security and Its Applications 9, nr 12 (31.12.2015): 77–84. http://dx.doi.org/10.14257/ijsia.2015.9.12.09.
Pełny tekst źródłaToğay, Cengiz. "A practical key agreement scheme for videoconferencing". Multimedia Tools and Applications 79, nr 33-34 (12.06.2020): 23711–28. http://dx.doi.org/10.1007/s11042-020-09136-6.
Pełny tekst źródłaZhang, Silan, Jianhua Chen, Jingbo Xia i Xiaochuan Ai. "An XTR-Based Constant Round Key Agreement Scheme". Mathematical Problems in Engineering 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/596868.
Pełny tekst źródłaChen, Li Qing, Cheng Fu Sun i Cheng Jie Xu. "An Authenticated Group Key Agreement Scheme for Wireless Sensor Networks Based on Bilinear Pairings". Advanced Materials Research 846-847 (listopad 2013): 876–82. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.876.
Pełny tekst źródłaLiu, Ping, Syed Hamad Shirazi, Wei Liu i Yong Xie. "pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud". Security and Communication Networks 2021 (18.10.2021): 1–10. http://dx.doi.org/10.1155/2021/6571700.
Pełny tekst źródłaWang, Jun, Yue Chen, Gang Yang, Hong Yong Jia i Ju Long Lan. "Multi-Factor Identity Authenticated Key Agreement Protocol". Applied Mechanics and Materials 556-562 (maj 2014): 5597–602. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5597.
Pełny tekst źródłaHao, Zhuo, Sheng Zhong i Nenghai Yu. "A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics". Scientific World Journal 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/935604.
Pełny tekst źródłaLEE, CHENG-CHI, CHUN-TA LI, KUO-YOU HUANG i SHIOW-YUAN HUANG. "AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES". Journal of Circuits, Systems and Computers 20, nr 04 (czerwiec 2011): 697–707. http://dx.doi.org/10.1142/s0218126611007554.
Pełny tekst źródłaDENG, Fei, i Jun HE. "Multi-key agreement protocol based on signature scheme". Journal of Computer Applications 32, nr 12 (30.05.2013): 3456–57. http://dx.doi.org/10.3724/sp.j.1087.2012.03456.
Pełny tekst źródłaCHEN, Li-qing. "Efficient key agreement scheme for dynamic secure multicast". Journal of Computer Applications 28, nr 8 (20.08.2008): 1943–45. http://dx.doi.org/10.3724/sp.j.1087.2008.01943.
Pełny tekst źródłaChain, Kai, Wen-Chung Kuo i Kuei-Hu Chang. "Enhancement key agreement scheme based on chaotic maps". International Journal of Computers and Applications 37, nr 2 (3.04.2015): 67–72. http://dx.doi.org/10.1080/1206212x.2015.1088211.
Pełny tekst źródłaPraveen, I., K. Rajeev i M. Sethumadhavan. "An Authenticated Key Agreement Scheme using Vector Decomposition". Defence Science Journal 66, nr 6 (31.10.2016): 594. http://dx.doi.org/10.14429/dsj.66.10799.
Pełny tekst źródłaKim, Kee-Won, Eun-Kyung Ryu i Kee-Young Yoo. "Cryptanalysis of Lee–Lee authenticated key agreement scheme". Applied Mathematics and Computation 163, nr 1 (kwiecień 2005): 193–98. http://dx.doi.org/10.1016/j.amc.2004.01.031.
Pełny tekst źródłaLee, Keon-Jik, i Byeong-Jik Lee. "Cryptanalysis of the modified authenticated key agreement scheme". Applied Mathematics and Computation 170, nr 1 (listopad 2005): 280–84. http://dx.doi.org/10.1016/j.amc.2004.11.042.
Pełny tekst źródła