Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0389-6
Abstract: In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol under the star topology with a central authentication server. Users can share a common session key without revealing any information of the…
read more here.
Keywords:
key;
cast key;
session key;
session ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-017-3506-4
Abstract: Classical public key cryptosystems (PKC), such as RSA, EIGamal, ECC, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem…
read more here.
Keywords:
key;
bell states;
quantum public;
key cryptosystem ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-7155-x
Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate…
read more here.
Keywords:
key;
private key;
identity based;
secure key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Quantum Information Processing"
DOI: 10.1007/s11128-019-2263-0
Abstract: Recently, Chau et al. (Phys Rev A 95:022311, 2017) reported a quantum key distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key…
read more here.
Keywords:
key;
state scheme;
six state;
scheme ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Science China Information Sciences"
DOI: 10.1007/s11432-018-9589-x
Abstract: Dear editor, With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currency (CBDC). In addition to…
read more here.
Keywords:
key;
private key;
digital signature;
two party ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2020 at "Symbiosis"
DOI: 10.1007/s13199-020-00714-8
Abstract: Work is in progress for the completion of a computer-aided key to all lichens known to occur in Italy, which will be freely available online, and as a free application for mobile devices. A first…
read more here.
Keywords:
key;
key lichens;
digital key;
lichens italy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.12.008
Abstract: Abstract Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced…
read more here.
Keywords:
key;
algorithm;
data privacy;
preservation mac ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Ticks and tick-borne diseases"
DOI: 10.1016/j.ttbdis.2021.101715
Abstract: Three Palearctic members of the subgenus Pholeoixodes, i.e., Ixodes canisuga, Ixodes hexagonus and Ixodes kaiseri are frequently collected from dogs, cats, red foxes, badgers and other carnivorous/insectivorous hosts in Europe. While a pictorial identification key…
read more here.
Keywords:
pholeoixodes species;
key;
nymphs larvae;
kaiseri ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "Laser Physics Letters"
DOI: 10.1088/1612-202x/ac50b2
Abstract: The question of the transfer of an external independent key through trusted nodes, between which the keys obtained during the quantum key distribution are located, is investigated. It is shown that when pushing external ɛ…
read more here.
Keywords:
pushing keys;
key;
networks complexity;
quantum networks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2893594
Abstract: When the eavesdropping channel has a certain correlation with the legitimate channel, the physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key, we propose a two-layer secure (TLS) quantization…
read more here.
Keywords:
key;
layer;
algorithm;
quantization algorithm ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3192970
Abstract: Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms…
read more here.
Keywords:
key;
energy costs;
energy;
encryption ... See more keywords