Results 21 to 30 of about 561,825 (309)

Cryptanalysis of “MAKE”

open access: yesJournal of Mathematical Cryptology, 2022
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ...
Brown Daniel R. L.   +2 more
doaj   +1 more source

Antibacterial Effect of Low-Concentration ZnO Nanoparticles on Sulfate-Reducing Bacteria under Visible Light

open access: yesNanomaterials, 2023
The effect of ZnO nanoparticles (ZnO NPs), with different concentrations in simulated water, on the activity of sulfate-reducing bacteria (SRB) and their adhesion behaviour on stainless-steel surfaces, with and without visible light treatment, were ...
Hua Yang   +7 more
doaj   +1 more source

SIKM – a smart cryptographic key management framework

open access: yesOpen Computer Science, 2022
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management.
Chaeikar Saman Shojae   +3 more
doaj   +1 more source

Effect of different disinfection treatments on the adhesion and separation of biofilm on stainless steel surface

open access: yesWater Science and Technology, 2021
Attachment and separation of sulfate-reducing bacteria (SRB) biofilm on stainless steel (SS) in simulated cooling water with and without different sterilization treatments was investigated by calculation of surface energy, theoretical work of adhesion ...
Yi Zhang   +6 more
doaj   +1 more source

Parallel Key Exchange

open access: yes, 2007
JUCS - Journal of Universal Computer Science Volume Nr.
Jeong,Ik, Lee,Dong
openaire   +2 more sources

Location-enhanced authenticated key exchange [PDF]

open access: yes2016 International Conference on Computing, Networking and Communications (ICNC), 2016
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication ...
Portnoi, Marcos, Shen, Chien-Chung
openaire   +2 more sources

Traceability Method for the Causes of Abnormal Electricity Prices Based on Comparative Analysis of Key Features

open access: yesZhongguo dianli
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO   +4 more
doaj   +1 more source

Construction Experience of German Electricity Market Adapting to Energy Transition

open access: yesZhongguo dianli
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO   +6 more
doaj   +1 more source

Post-quantum key exchange protocols [PDF]

open access: yesSPIE Proceedings, 2006
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Li, Xiangdong   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy