Results 111 to 120 of about 10,790,774 (280)
Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks. [PDF]
Roy AK +4 more
europepmc +1 more source
Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols [PDF]
Mariana Durcheva, Kiril Danilchenko
openalex +3 more sources
The Asian crisis took place against a background of exchange rate regimes that were characterized as soft pegs. This has led many analysts to conclude that the peg did it' and that emerging markets (EMs) should just say no' to pegged exchange rates.
Carmen M. Reinhart, Guillermo A. Calvo
core
Tripartite authenticated key exchange protocol for smart grid
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG +3 more
doaj
Non-interactive zero-knowledge proof scheme from RLWE-based key exchange. [PDF]
Xie S, Yao W, Wu F, Zheng Z.
europepmc +1 more source
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf +2 more
doaj +1 more source
Quantum Diffie–Hellman key exchange
The Diffie–Hellman key exchange plays a crucial role in conventional cryptography, as it allows two legitimate users to establish a common, usually ephemeral, secret key. Its security relies on the discrete-logarithm problem, which is considered to be a mathematical one-way function, while the final key is formed by random independent actions of the ...
openaire +3 more sources
Segmented Asset Markets and Optimal Exchange Rate Regimes [PDF]
This paper revisits the issue of the optimal exchange rate regime in a flexible price environment. The key innovation is that we analyze this question in the context of environments where only a fraction of agents participate in asset market transactions
Amartya Lahiri +2 more
core
Efficient anonymous password-based authenticated key exchange scheme
Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a(short) password with a session key(e.g.,the key was used for data confidentiality and/or integrity).There has been much interest ...
TAN Shi-chong +3 more
doaj

