Results 31 to 40 of about 3,103,043 (192)
Corrosion Behavior of 2205 DSS Base Metal and ER 2209 Weld Metal in a Deposited Ash/Water Suspension
The corrosion behavior of 2205 duplex stainless steel (DSS) base metal (BM) and ER2209 weld metal (WM) in an ash/water suspension composed of deposited ash on the flue gas side of a low-temperature heat exchanger in a waste-to-energy plant and water was ...
Fang Ge +6 more
doaj +1 more source
Location-enhanced authenticated key exchange [PDF]
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication ...
Portnoi, Marcos, Shen, Chien-Chung
openaire +2 more sources
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO +4 more
doaj +1 more source
Construction Experience of German Electricity Market Adapting to Energy Transition
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO +6 more
doaj +1 more source
Oblivious Transfer based on Key Exchange
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh +3 more
core +1 more source
Post-quantum key exchange protocols [PDF]
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Li, Xiangdong +5 more
openaire +2 more sources
Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their
Maksymilian Gorski, Wojciech Wodo
doaj +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie +6 more
doaj +1 more source
Deep Random based Key Exchange protocol resisting unlimited MITM
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon +4 more
core +1 more source

