Results 81 to 90 of about 3,103,043 (192)

Kurtosis-Based State of Health Prediction of Lithium-Ion Batteries Using Probability Density Function

open access: yesElectrochemistry
Lithium-ion batteries are widely used as power sources for various devices, so rapid and accurate estimation of the health status of lithium-ion batteries is an important means to reduce battery failures.
Yinsen YU   +8 more
doaj   +1 more source

Algebraic generalization of Diffie–Hellman key exchange

open access: yesJournal of Mathematical Cryptology, 2018
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. Its underlying algebraic structure is a cyclic group and its security is based on the discrete logarithm problem (DLP).
Partala Juha
doaj   +1 more source

The Microstructure of Currency Markets [PDF]

open access: yes
This article summarizes exchange-rate research using microstructure models. It first lays out the key features of the foreign exchange market and describes how they are incorporated into a canonical model of currency trading.
Martin Evans
core  

Tripartite authenticated key exchange protocol for smart grid

open access: yesTongxin xuebao, 2023
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG   +3 more
doaj  

Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks. [PDF]

open access: yesSensors (Basel), 2022
Roy AK   +4 more
europepmc   +1 more source

Combinatorial group theory and public key cryptography

open access: yes, 2004
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core   +2 more sources

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

open access: yesCryptography
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy