Results 81 to 90 of about 10,790,774 (280)
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected ...
Chien-Lung Hsu +4 more
doaj +1 more source
An Alternative Diffie-Hellman Protocol
The Diffie−Hellman protocol, ingenious in its simplicity, is still the major solution in protocols for generating a shared secret in cryptography for e-trading and many other applications after an impressive number of decades.
Eric Järpe
doaj +1 more source
Physical Origin of the One-Quarter Exact Exchange in Density Functional Theory [PDF]
Exchange interactions are a manifestation of the quantum mechanical nature of the electrons and play a key role in predicting the properties of materials from first principles.
Bernardi, Marco
core +1 more source
Verifiable three-party secure key exchange protocol based on eigenvalue
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG +3 more
doaj
Estimation of the Behavioral Equilibrium Real Exchange Rate of the Czech Koruna [PDF]
Purpose of the article The paper examines the behavior of the real exchange rate in the Czech Republic. It focuses on the analysis of its driving forces with the emphasis on the turbulences which have been lately seen in the financial and real sector of ...
Pošta, Vít
core
Semi – Chaotic Mutual Learning Platform for Key – Exchange Algorithm Using Neural Network [PDF]
Neural network has been emerged the cryptography field as efficient tool for both cryptanalysis and cryptography due to its amazing ability to explore solution space for a given problem.
Enas H. Salih +2 more
doaj +1 more source
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks [PDF]
Security and Communication Networks
openalex +1 more source
Group key exchange protocols withstanding ephemeral‐key reveals
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets: long‐term keys (for authentication) and freshly generated (often random) values. The leakage of this latter so‐called ephemeral keys has been extensively analysed in the 2‐party ...
González Vasco, María Isabel +2 more
openaire +2 more sources
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
Key Exchange Using Passwords and Long Keys [PDF]
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk [16] (HK), where clients have a password
Vladimir Kolesnikov, Charles Rackoff
openaire +1 more source

