Results 161 to 170 of about 2,989,875 (336)
Authenticated Key Exchange Secure against Dictionary Attacks
Mihir Bellare +2 more
openalex +1 more source
Molecular dynamics simulations are advancing the study of ribonucleic acid (RNA) and RNA‐conjugated molecules. These developments include improvements in force fields, long‐timescale dynamics, and coarse‐grained models, addressing limitations and refining methods.
Kanchan Yadav, Iksoo Jang, Jong Bum Lee
wiley +1 more source
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Duncan S. Wong, Agnes Chan
openalex +1 more source
Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange [PDF]
Jong Hu Lee +2 more
openalex +1 more source
Ni‐base superalloys produced using additive manufacturing (AM) have a different response to heat treatments when compared to their conventional counterparts. Due to such unpredictability, various alloys with industrial interest are currently overlooked in most prior AM research.
Guilherme Maziero Volpato +6 more
wiley +1 more source
Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
Emmanuel Bresson +2 more
openalex +1 more source
The role of various alloying elements in face‐centered cubic aluminum on the barrier of a Shockley partial dislocation during its motion is presented. The study aims to understand how alloying atoms such as Mg, Si, and Zr affect the energy landscape for dislocation motion, thus influencing the solid solution hardening and softening in aluminum, which ...
Inna Plyushchay +3 more
wiley +1 more source
Efficient anonymous password-based authenticated key exchange scheme
Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a(short) password with a session key(e.g.,the key was used for data confidentiality and/or integrity).There has been much interest ...
TAN Shi-chong +3 more
doaj
Security Analysis of IKE’s Signature-Based Key-Exchange Protocol
Ran Canetti, Hugo Krawczyk
openalex +1 more source
A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers [PDF]
Guomin Huang +2 more
openalex +1 more source

