Results 31 to 40 of about 1,013,153 (241)
Key Agreement Scheme Based on Ocean Acoustic Channel [PDF]
Aiming at the problem that underwater acoustic channel is vulnerable to various threats and attacks due to the uncertainty of marine environment,a key agreement scheme based on ocean acoustic channel is proposed.Firstly,the uncertainty of marine ...
LIANG Zhen-zhen, XU Ming
doaj +1 more source
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan +7 more
doaj +1 more source
Cryptanalysing variants of Stickel's key agreement scheme
Stickel's key agreement scheme was successfully cryptanalysed by V. Shpilrain when GL(n, q) is used as a platform. Shpilrain suggested the algebra of all (not necessarily invertible) n × n matrices defined over some finite ring R would make a more secure
Mullan Ciaran
doaj +1 more source
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or ...
Tsung-Hung Lin, Ming-Te Chen
doaj +1 more source
Hierarchical certificateless authenticated key agreement protocol
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj +2 more sources
Recently, Ostad-Sharif et al. pointed out the susceptibility of three different authentication schemes themed for telecare medicine/medical information systems to key compromise impersonation attack (KCIA). To further address this issue, they proposed an
Saru Kumari +3 more
doaj +1 more source
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh +2 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
Key agreement based on automaton groups [PDF]
Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group
Grigorchuk, R., Grigoriev, D.
openaire +4 more sources
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source

