Articles with "multiple key" as a keyword



Photo by lensingmyworld from unsplash

MANET Security Betterment by Enhanced Multiple Key Management Scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3368-8

Abstract: Creating and accessing multiple groups with various validations in Mobile Ad hoc Networks (MANET) is getting popular these days. Providing privacy as well as accessibility at the same time is a challenging process because the… read more here.

Keywords: management scheme; enhanced multiple; management; key management ... See more keywords
Photo from wikipedia

Disordered Mixture of Self-Assembled Molecular Functional Groups on Heterointerfaces with p-Si Leads to Multiple Key Generation in Physical Unclonable Functions.

Sign Up to like & get
recommendations!
Published in 2022 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.2c18740

Abstract: Physical unclonable function (PUF) security devices based on hardware are becoming an effective strategy to overcome the dependency of the internet cloud and software-based hacking vulnerabilities. On the other hand, existing Si-based artificial security devices… read more here.

Keywords: multiple key; mixture; key generation; self assembled ... See more keywords