Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti, H. Krawczyk
semanticscholar +1 more source
Enhancing security in Wireless Body Area Networks (WBANs) with ECC-based Diffie-Hellman Key Exchange algorithm (ECDH). [PDF]
S S A, Devprasad KD, J RS.
europepmc +1 more source
On the security of a simple three-party key exchange protocol without server's public keys. [PDF]
Nam J, Choo KK, Park M, Paik J, Won D.
europepmc +1 more source
Africa Heat Exchangers Market: Driving Energy Efficiency and Industrial Growth Across Key Sectors
Next Move Strategy Consulting
openalex +1 more source
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors. [PDF]
Vadai G, Mingesz R, Gingl Z.
europepmc +1 more source
Secure private key exchange method based on optical interferometry using biometric finger print
Seok Hee Jeon, Sang Keun Gil
openalex +1 more source
Password-only authenticated three-party key exchange with provable security in the standard model. [PDF]
Nam J +6 more
europepmc +1 more source
Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems. [PDF]
Xie Q, Hu B, Dong N, Wong DS.
europepmc +1 more source
Jini distributed key exchange and file transfer service with digital signatures
Kevin Ligozio
openalex +1 more source
The Hardware Design and Implementation of a Key Exchange Protocol for Low-cost IoT Devices
Dennis Agyemanh +49 more
openalex +1 more source

