Results 51 to 60 of about 10,790,774 (280)

Traceability Method for the Causes of Abnormal Electricity Prices Based on Comparative Analysis of Key Features

open access: yesZhongguo dianli
The electricity price directly reflects the attributes of electricity commodities. However, influenced by various factors such as market supply and demand, power generation company bids, and line transmission capacity, the electricity price signals often
Weijia ZHAO   +4 more
doaj   +1 more source

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks

open access: yesIEEE Access, 2020
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the amount of data, so multi-server distributed cloud computing has been widely used in various applications that have brought convenience to our daily lives.
Tsu-Yang Wu   +5 more
semanticscholar   +1 more source

Construction Experience of German Electricity Market Adapting to Energy Transition

open access: yesZhongguo dianli
China is moving towards a cleaner energy structure. How to promote the high proportion of renewable energy consumption through market construction is the focus of energy structure adjustment.
Zhengnan GAO   +6 more
doaj   +1 more source

Post-quantum key exchange protocols [PDF]

open access: yesSPIE Proceedings, 2006
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Li, Xiangdong   +5 more
openaire   +2 more sources

Oblivious Transfer based on Key Exchange

open access: yes, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +1 more source

Coded Cooperative Data Exchange for a Secret Key

open access: yes, 2014
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Specifically, we investigate the number of public transmissions required for a set of clients to agree on a secret key with probability one, subject to the ...
Courtade, Thomas A., Halford, Thomas R.
core   +1 more source

3.3 Gigahertz Clocked Quantum Key Distribution System [PDF]

open access: yes, 2005
A fibre-based quantum key distribution system operating up to a clock frequency of 3.3GHz is presented. The system demonstrates significantly increased key exchange rate potential and operates at a wavelength of 850nm.Comment: Presented at ECOC 05 ...
Buller, Gerald S.   +6 more
core   +2 more sources

Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE

open access: yesCryptography
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their
Maksymilian Gorski, Wojciech Wodo
doaj   +1 more source

Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids

open access: yesNanomaterials, 2020
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie   +6 more
doaj   +1 more source

Towards Bidirectional Ratcheted Key Exchange [PDF]

open access: yes, 2018
Ratcheted key exchange (RKE) is a cryptographic technique used in instant messaging systems like Signal and the WhatsApp messenger for attaining strong security in the face of state exposure attacks. RKE received academic attention in the recent works of
B Schneier   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy