Results 41 to 50 of about 2,989,875 (336)
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO +4 more
doaj +1 more source
Towards Bidirectional Ratcheted Key Exchange [PDF]
Ratcheted key exchange (RKE) is a cryptographic technique used in instant messaging systems like Signal and the WhatsApp messenger for attaining strong security in the face of state exposure attacks. RKE received academic attention in the recent works of
B Schneier +5 more
core +1 more source
Construction Experience of German Electricity Market Adapting to Energy Transition
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO +6 more
doaj +1 more source
Performance of Copper Corrosion Inhibitors on Pipecoridithiocarbamic Acid in 3 wt% NaCl Solution
Pipecolyldithiocarbamic Acid (PIPDTC) is actually considered as a potential corrosion inhibitor. The inhibition behavior of PIPDTC is appropriately confirmed by electrochemical measurements accompanied with spectra characterization techniques and DFT ...
Rongbo WEI +4 more
doaj +1 more source
Post-quantum key exchange protocols [PDF]
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Lin Leung +5 more
openaire +3 more sources
Coded Cooperative Data Exchange for a Secret Key
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the ...
Courtade, Thomas A., Halford, Thomas R.
core +1 more source
Multi-factor Authenticated Key Exchange [PDF]
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire +3 more sources
Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie +6 more
doaj +1 more source
The Twist-AUgmented Technique for Key Exchange [PDF]
Key derivation refers to the process by which an agreed upon large random number, often named master secret, is used to derive keys to encrypt and authenticate data. Practitioners and standardization bodies have usually used the random oracle model to get key material from a Diffie-Hellman key exchange.
Chevassut, Olivier +3 more
openaire +3 more sources
Key Exchange Using Passwords and Long Keys [PDF]
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire +1 more source

