Results 41 to 50 of about 3,103,043 (192)

Inhibition Synergism Between Alkyl Imidazoline and Potassium Iodide on the Corrosion of Carbon Steel in Citric Acid Solution

open access: yesInternational Journal of Electrochemical Science, 2020
The synergistic inhibition effect of the complex of 2-undecyl-N-carboxymethyl-N-hydroxyethly imidazoline (UHCI) and potassium iodide (KI) on the corrosion of 45# carbon steel subjected to 4 wt.% citric acid solution is explored by weight loss testing ...
Jianjia Shen   +6 more
doaj   +1 more source

Formation and Inhibition of Calcium Carbonate Crystals under Cathodic Polarization Conditions

open access: yesCrystals, 2020
The formation of CaCO3 crystals on the cathode surface and the scale-inhibition performance of scale inhibitor 2-phosphonobutane-1,2,4-tricarboxylic acid (PBTCA) on the cathode surface were studied by methods of solution analysis, gravimetric analysis ...
Kun Sheng   +7 more
doaj   +1 more source

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

Multi-factor Authenticated Key Exchange [PDF]

open access: yes, 2008
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire   +2 more sources

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

open access: yesIEEE Access, 2019
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are
K. M. Renuka   +3 more
doaj   +1 more source

Developed Protocol for Key Exchange Based on Irreducible Polynomial [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of ...
Abdul Monem S. Rahma   +2 more
doaj   +1 more source

The QQUIC Transport Protocol: Quantum-Assisted UDP Internet Connections

open access: yesEntropy, 2022
Quantum key distribution, initialized in 1984, is a commercialized secure communication method that enables two parties to produce a shared random secret key using quantum mechanics.
Peng Yan, Nengkun Yu
doaj   +1 more source

EasyUC: using EasyCrypt to mechanize proofs of universally composable security [PDF]

open access: yes, 2019
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols ...
Canetti, Ran   +2 more
core   +2 more sources

Non-invertible key exchange protocol

open access: yesSN Applied Sciences, 2020
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key exchange method to establish a secret key between two remote parties.
Luis Adrian Lizama-Perez
doaj   +1 more source

Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]

open access: yesEngineering and Technology Journal, 2011
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj   +1 more source

Home - About - Disclaimer - Privacy