Results 111 to 120 of about 10,790,774 (280)

Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks. [PDF]

open access: yesSensors (Basel), 2022
Roy AK   +4 more
europepmc   +1 more source

Fixing for Your Life [PDF]

open access: yes
The Asian crisis took place against a background of exchange rate regimes that were characterized as soft pegs. This has led many analysts to conclude that the peg did it' and that emerging markets (EMs) should just say no' to pegged exchange rates.
Carmen M. Reinhart, Guillermo A. Calvo
core  

Tripartite authenticated key exchange protocol for smart grid

open access: yesTongxin xuebao, 2023
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG   +3 more
doaj  

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

open access: yesCryptography
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf   +2 more
doaj   +1 more source

Quantum Diffie–Hellman key exchange

open access: yesAPL Quantum
The Diffie–Hellman key exchange plays a crucial role in conventional cryptography, as it allows two legitimate users to establish a common, usually ephemeral, secret key. Its security relies on the discrete-logarithm problem, which is considered to be a mathematical one-way function, while the final key is formed by random independent actions of the ...
openaire   +3 more sources

Segmented Asset Markets and Optimal Exchange Rate Regimes [PDF]

open access: yes
This paper revisits the issue of the optimal exchange rate regime in a flexible price environment. The key innovation is that we analyze this question in the context of environments where only a fraction of agents participate in asset market transactions
Amartya Lahiri   +2 more
core  

Efficient anonymous password-based authenticated key exchange scheme

open access: yesTongxin xuebao, 2009
Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a(short) password with a session key(e.g.,the key was used for data confidentiality and/or integrity).There has been much interest ...
TAN Shi-chong   +3 more
doaj  

Strongly Anonymous Ratcheted Key Exchange

open access: yes, 2022
Dowling, B.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy