Results 41 to 50 of about 2,989,875 (336)

Traceability Method for the Causes of Abnormal Electricity Prices Based on Comparative Analysis of Key Features

open access: yesZhongguo dianli
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO   +4 more
doaj   +1 more source

Towards Bidirectional Ratcheted Key Exchange [PDF]

open access: yes, 2018
Ratcheted key exchange (RKE) is a cryptographic technique used in instant messaging systems like Signal and the WhatsApp messenger for attaining strong security in the face of state exposure attacks. RKE received academic attention in the recent works of
B Schneier   +5 more
core   +1 more source

Construction Experience of German Electricity Market Adapting to Energy Transition

open access: yesZhongguo dianli
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO   +6 more
doaj   +1 more source

Performance of Copper Corrosion Inhibitors on Pipecoridithiocarbamic Acid in 3 wt% NaCl Solution

open access: yesElectrochemistry, 2023
Pipecolyldithiocarbamic Acid (PIPDTC) is actually considered as a potential corrosion inhibitor. The inhibition behavior of PIPDTC is appropriately confirmed by electrochemical measurements accompanied with spectra characterization techniques and DFT ...
Rongbo WEI   +4 more
doaj   +1 more source

Post-quantum key exchange protocols [PDF]

open access: yesSPIE Proceedings, 2006
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Lin Leung   +5 more
openaire   +3 more sources

Coded Cooperative Data Exchange for a Secret Key

open access: yes, 2014
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the ...
Courtade, Thomas A., Halford, Thomas R.
core   +1 more source

Multi-factor Authenticated Key Exchange [PDF]

open access: yes, 2008
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire   +3 more sources

Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids

open access: yesNanomaterials, 2020
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie   +6 more
doaj   +1 more source

The Twist-AUgmented Technique for Key Exchange [PDF]

open access: yes, 2006
Key derivation refers to the process by which an agreed upon large random number, often named master secret, is used to derive keys to encrypt and authenticate data. Practitioners and standardization bodies have usually used the random oracle model to get key material from a Diffie-Hellman key exchange.
Chevassut, Olivier   +3 more
openaire   +3 more sources

Key Exchange Using Passwords and Long Keys [PDF]

open access: yes, 2006
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire   +1 more source

Home - About - Disclaimer - Privacy