Results 31 to 40 of about 3,103,043 (192)

Corrosion Behavior of 2205 DSS Base Metal and ER 2209 Weld Metal in a Deposited Ash/Water Suspension

open access: yesInternational Journal of Electrochemical Science, 2021
The corrosion behavior of 2205 duplex stainless steel (DSS) base metal (BM) and ER2209 weld metal (WM) in an ash/water suspension composed of deposited ash on the flue gas side of a low-temperature heat exchanger in a waste-to-energy plant and water was ...
Fang Ge   +6 more
doaj   +1 more source

Location-enhanced authenticated key exchange [PDF]

open access: yes2016 International Conference on Computing, Networking and Communications (ICNC), 2016
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication ...
Portnoi, Marcos, Shen, Chien-Chung
openaire   +2 more sources

Traceability Method for the Causes of Abnormal Electricity Prices Based on Comparative Analysis of Key Features

open access: yesZhongguo dianli
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO   +4 more
doaj   +1 more source

Construction Experience of German Electricity Market Adapting to Energy Transition

open access: yesZhongguo dianli
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO   +6 more
doaj   +1 more source

Oblivious Transfer based on Key Exchange

open access: yes, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +1 more source

Post-quantum key exchange protocols [PDF]

open access: yesSPIE Proceedings, 2006
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Li, Xiangdong   +5 more
openaire   +2 more sources

Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE

open access: yesCryptography
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their
Maksymilian Gorski, Wojciech Wodo
doaj   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids

open access: yesNanomaterials, 2020
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie   +6 more
doaj   +1 more source

Deep Random based Key Exchange protocol resisting unlimited MITM

open access: yes, 2018
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy