Results 211 to 220 of about 5,738 (242)
Some of the next articles are maybe not open access.
Nonlinear Dynamics, 2014
With the aim of guaranteeing secure communication through public networks, three-factor password authentication (TF-PWA) scheme plays a key role in many internet applications. Since in TF-PWA scheme, the communicating entities can mutually authenticate each other and generate a shared session key, which will be used for secure exchange of messages in ...
openaire +1 more source
With the aim of guaranteeing secure communication through public networks, three-factor password authentication (TF-PWA) scheme plays a key role in many internet applications. Since in TF-PWA scheme, the communicating entities can mutually authenticate each other and generate a shared session key, which will be used for secure exchange of messages in ...
openaire +1 more source
V2G authentication and quantum key distribution scheme based on extended chaotic mapping
Journal of Computational Methods in Sciences and EngineeringV2G technology enables bidirectional energy transfer from EVs to the grid. It is possible to use the grid to charge EVs and to use EVs to charge the grid during peak grid hours, thus alleviating the problem of grid load fluctuations and improving grid efficiency. Many traditional authentication protocols have been proposed to protect V2G.
openaire +1 more source
Extended Initial Study on the Performance of Enhanced PSO Algorithm with Lozi Chaotic Map
2013In this paper, it is proposed the utilization of discrete Lozi map based chaos random number generator to enhance the performance of PSO algorithm with inertia weight. Performance tests and results are presented. Results are analyzed and compared with another evolutionary algorithm. Tuning experiment was performed.
Michal Pluhacek +4 more
openaire +1 more source
Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps
2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON), 2023Suresh Devanapalli, Kolloju Phaneendra
openaire +1 more source
Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps
IEEE Transactions on Industry Applications, 2022Weizheng Wang +5 more
openaire +1 more source
Gradients and consequences of heterogeneity in biofilms
Nature Reviews Microbiology, 2022Jeanyoung Jo +2 more
exaly
Surveying membrane landscapes: a new look at the bacterial cell surface
Nature Reviews Microbiology, 2023Trevor James Lithgow +1 more
exaly
Global view of human protein glycosylation pathways and functions
Nature Reviews Molecular Cell Biology, 2020Katrine T Schjoldager +2 more
exaly
IEEE Transactions on Industry Applications, 2023
Chien-Ming Chen, Yiru Hao, Tsu-Yang Wu
openaire +1 more source
Chien-Ming Chen, Yiru Hao, Tsu-Yang Wu
openaire +1 more source
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Arijit Karati +2 more
openaire +1 more source
Arijit Karati +2 more
openaire +1 more source

