Results 81 to 90 of about 10,790,774 (280)

A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks

open access: yesIEEE Access, 2020
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected ...
Chien-Lung Hsu   +4 more
doaj   +1 more source

An Alternative Diffie-Hellman Protocol

open access: yesCryptography, 2020
The Diffie−Hellman protocol, ingenious in its simplicity, is still the major solution in protocols for generating a shared secret in cryptography for e-trading and many other applications after an impressive number of decades.
Eric Järpe
doaj   +1 more source

Physical Origin of the One-Quarter Exact Exchange in Density Functional Theory [PDF]

open access: yes, 2020
Exchange interactions are a manifestation of the quantum mechanical nature of the electrons and play a key role in predicting the properties of materials from first principles.
Bernardi, Marco
core   +1 more source

Verifiable three-party secure key exchange protocol based on eigenvalue

open access: yesTongxin xuebao, 2019
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG   +3 more
doaj  

Estimation of the Behavioral Equilibrium Real Exchange Rate of the Czech Koruna [PDF]

open access: yes, 2010
Purpose of the article The paper examines the behavior of the real exchange rate in the Czech Republic. It focuses on the analysis of its driving forces with the emphasis on the turbulences which have been lately seen in the financial and real sector of ...
Pošta, Vít
core  

Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network [PDF]

open access: yesEngineering and Technology Journal, 2012
Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem.
Enas H. Salih   +2 more
doaj   +1 more source

Group key exchange protocols withstanding ephemeral‐key reveals

open access: yesIET Information Security, 2018
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets: long‐term keys (for authentication) and freshly generated (often random) values. The leakage of this latter so‐called ephemeral keys has been extensively analysed in the 2‐party ...
González Vasco, María Isabel   +2 more
openaire   +2 more sources

Authenticated tree parity machine key exchange

open access: yes, 2004
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core  

Key Exchange Using Passwords and Long Keys [PDF]

open access: yes, 2006
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire   +1 more source

Home - About - Disclaimer - Privacy