Results 151 to 160 of about 561,825 (309)
Anonymous Authenticated Key Exchange
Abstract Authenticated Key Exchange ( $${\textsf {AKE}}$$ AKE ) can be used in client-server applications for mutual authentication and key establishment. In scenarios where client authentication is neither feasible nor desirable, One-
José Ignacio Escribano Pablos +3 more
openaire +1 more source
Freeze‐drying of layered silicate is the key to get coatings with superior gas barrier. Freeze‐drying of layered silicates modified with dodecylamine (DDA) is a highly effective technique for the preparation of barrier pigments that significantly mitigate the permeation of oxygen, water vapor, and hydrogen through polymer films containing these ...
Joshua Lommes +4 more
wiley +1 more source
Simultaneous transmission of information and key exchange using the same photonic quantum states. [PDF]
Pan D +9 more
europepmc +1 more source
Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps. [PDF]
Pak K, Pak S, Ho C, Pak M, Hwang C.
europepmc +1 more source
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu +8 more
wiley +1 more source
Password authenticated key exchange-based on Kyber for mobile devices. [PDF]
Seyhan K, Akleylek S, Dursun AF.
europepmc +1 more source
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange. [PDF]
Rivero-García A +4 more
europepmc +1 more source
Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation [PDF]
Youngsook Lee, Jee-Yeon Kim, Dongho Won
openalex +1 more source
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel +3 more
wiley +1 more source
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key. [PDF]
Seyhan K, Akleylek S.
europepmc +1 more source

