Results 81 to 90 of about 3,103,043 (192)
Lithium-ion batteries are widely used as power sources for various devices, so rapid and accurate estimation of the health status of lithium-ion batteries is an important means to reduce battery failures.
Yinsen YU +8 more
doaj +1 more source
Algebraic generalization of Diffie–Hellman key exchange
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. Its underlying algebraic structure is a cyclic group and its security is based on the discrete logarithm problem (DLP).
Partala Juha
doaj +1 more source
Symmetric private information retrieval supported by quantum-secure key-exchange network. [PDF]
Wang S.
europepmc +1 more source
A Novel Secure Authentication Protocol for e-Health Records in Cloud with a New Key Generation Method and Minimized Key Exchange. [PDF]
Mohinder Singh B, Natarajan J.
europepmc +1 more source
The Microstructure of Currency Markets [PDF]
This article summarizes exchange-rate research using microstructure models. It first lays out the key features of the foreign exchange market and describes how they are incorporated into a canonical model of currency trading.
Martin Evans
core
Tripartite authenticated key exchange protocol for smart grid
Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange ...
Shengbao WANG +3 more
doaj
Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps. [PDF]
Pak KS, Kim MH, Pak SH, Ho CM.
europepmc +1 more source
Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks. [PDF]
Roy AK +4 more
europepmc +1 more source
Combinatorial group theory and public key cryptography
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core +2 more sources
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf +2 more
doaj +1 more source

