-
1
Consistency of group key exchange protocols
Published 2008-01-01Subjects: “…consistency;group key exchange;attack…”
Get full text
Article -
2
-
3
-
4
Peningkatan Keamanan Jaringan Virtual Private Network Menggunakan Protokol IKE/IPSEC Berbasis Mikrotik
Published 2024-12-01Subjects: “…Internet Key Exchange…”
Get full text
Article -
5
NeuralSyncTester: A tool for research and teaching in neural synchronization of multilayer tree parity machine networks
Published 2025-09-01Subjects: Get full text
Article -
6
Predicate-based authenticated key exchange protocol with attribute-hiding
Published 2012-09-01Subjects: “…key exchange protocol;predicate authentication;attribute-hiding;eCK model…”
Get full text
Article -
7
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: “…three-party key exchange…”
Get full text
Article -
8
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: “…password-authenticated key exchange…”
Get full text
Article -
9
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01Subjects: “…three-party key exchange…”
Get full text
Article -
10
Security model for ID-based key exchange
Published 2010-01-01Subjects: “…ID-based key exchange…”
Get full text
Article -
11
On the security of the STR key exchange protocol
Published 2025-02-01Subjects: Get full text
Article -
12
A new public key cryptography using generalized Fibonacci matrices
Published 2024-12-01Subjects: Get full text
Article -
13
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
Published 2025-05-01Subjects: Get full text
Article -
14
ON THE SECURITY OF GENERALIZED MULTILINEAR MAPS BASED ON WEIL PAIRING
Published 2025-04-01Subjects: Get full text
Article -
15
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol
Published 2025-02-01Subjects: Get full text
Article -
16
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: “…lattice-based cryptology;provably secure;password authentication;key exchange;ring-learning-with-error…”
Get full text
Article -
17
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
18
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Published 2025-01-01Subjects: “…group authenticated key exchange…”
Get full text
Article -
19
Securing IoT communication: a module-LWE key exchange protocol with efficient error reconciliation technique
Published 2025-07-01Subjects: Get full text
Article -
20
Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions
Published 2024-10-01Subjects: Get full text
Article