Results 241 to 250 of about 4,573,671 (268)
Some of the next articles are maybe not open access.

Key Generation by Computer

Nature, 1970
KEYS for the identification of specimens have been used by biologists for several centuries. A method is described here for generating such keys automatically by computer, instead of composing them by hand, which until recently was the only way to produce them.
openaire   +2 more sources

Physical Layer Key Generation

ACM Transactions on Cyber-Physical Systems, 2018
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance, traffic control, and environmental hazards.
Jiang Wan   +2 more
openaire   +1 more source

Covert secret key generation

2017 IEEE Conference on Communications and Network Security (CNS), 2017
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key ...
Mehrdad Tahmasbi, Matthieu R. Bloch
openaire   +1 more source

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security

2018
This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG.
Atsushi Fujioka, Kazuki Yoneyama
openaire   +1 more source

Generic key performance indicators

The Third International Conference on e-Technologies and Networks for Development (ICeND2014), 2014
This paper tackles the concept of key performance indicators (KPI) that is being hosted in almost all software systems, trying to make use computer systems and algorithms to optimize and help concerned parties with more efficient analysis of data being given to them.
Chadi Kallab, Marc Ghawi
openaire   +1 more source

Key Generation

2022
Surendra Kumar, Narander Kumar
openaire   +2 more sources

Public Key Infrastructures - The Next Generation

BT Technology Journal, 2001
A public key infrastructure (PKI) is a credential verification scheme based upon public/private key-pair cryptography. This paper explores the PKI story so far and then goes on to identify some of the problems that stand in the way of globalisation and truly successful commercial PKI interworking. Current solutions to these problems are explained, with
K P Bosworth, N Tedeschi
openaire   +1 more source

Efficient ZHFE Key Generation

2016
In this paper we present a new algorithm to construct the keys of the multivariate public key encryption scheme ZHFE. Constructing ZHFE's trapdoor involves finding a low degree polynomial of q-Hamming-weight-three, as an aid to invert a pair of q-Hamming-weight-two polynomials of high degree and high rank.
John B. Baena   +4 more
openaire   +1 more source

Generalized key player problem

Computational and Mathematical Organization Theory, 2014
The key player problem (KPP) identifies a set of key nodes that have a central role in a network. In this paper, we propose a generalized KPP (GKPP) that extends existing work on KPP-Pos and KPP-Neg in such a way that it can consider network structure, node attributes, and the characteristics of edges.
openaire   +1 more source

Key Issues Uniting Generations

2010
Christopher Buckley’s satire, Boomsday, opens with Gen Xers attacking a gated retirement community in protest of the taxes they must pay to support aging “baby boomers” who do nothing but play golf during their long, leisurely retirement years. Encouraged by blogger Cassandra Devine, a new plan is introduced in Congress to address the growing conflict.
openaire   +1 more source

Home - About - Disclaimer - Privacy