Results 41 to 50 of about 3,103,043 (192)
The synergistic inhibition effect of the complex of 2-undecyl-N-carboxymethyl-N-hydroxyethly imidazoline (UHCI) and potassium iodide (KI) on the corrosion of 45# carbon steel subjected to 4 wt.% citric acid solution is explored by weight loss testing ...
Jianjia Shen +6 more
doaj +1 more source
Formation and Inhibition of Calcium Carbonate Crystals under Cathodic Polarization Conditions
The formation of CaCO3 crystals on the cathode surface and the scale-inhibition performance of scale inhibitor 2-phosphonobutane-1,2,4-tricarboxylic acid (PBTCA) on the cathode surface were studied by methods of solution analysis, gravimetric analysis ...
Kun Sheng +7 more
doaj +1 more source
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
Multi-factor Authenticated Key Exchange [PDF]
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire +2 more sources
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are
K. M. Renuka +3 more
doaj +1 more source
Developed Protocol for Key Exchange Based on Irreducible Polynomial [PDF]
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of ...
Abdul Monem S. Rahma +2 more
doaj +1 more source
The QQUIC Transport Protocol: Quantum-Assisted UDP Internet Connections
Quantum key distribution, initialized in 1984, is a commercialized secure communication method that enables two parties to produce a shared random secret key using quantum mechanics.
Peng Yan, Nengkun Yu
doaj +1 more source
EasyUC: using EasyCrypt to mechanize proofs of universally composable security [PDF]
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols ...
Canetti, Ran +2 more
core +2 more sources
Non-invertible key exchange protocol
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key exchange method to establish a secret key between two remote parties.
Luis Adrian Lizama-Perez
doaj +1 more source
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source

