Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Huanhuan Lian"'
Publikováno v:
IEEE Access, Vol 12, Pp 98611-98622 (2024)
With the rocketing progress of the fifth generation (5G) mobile communication technology, identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly significant part in secure communication. The majority of current efficien
Externí odkaz:
https://doaj.org/article/9c756194502f45bb9902d0a7e8c1dd3c
Publikováno v:
Tongxin xuebao, Vol 43, Pp 95-106 (2022)
In view of the fact that server stored the passwords directly in plaintext, there was a risk of server compromise, and two-party PAKE protocol was not suitable for large-scale communication systems, a three-party verifier-based password authenticated
Externí odkaz:
https://doaj.org/article/31d8196de7784543a6596213474e207d
Publikováno v:
Tongxin xuebao, Vol 39, Pp 87-97 (2018)
Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could no
Externí odkaz:
https://doaj.org/article/c16e8f192c3e493ba48f30f4167810e3
Publikováno v:
Chinese Journal of Lung Cancer, Vol 19, Iss 12, Pp 813-820 (2016)
Background and objective The aim of this study is to determine the efficacy and feasibility of a novel folate receptor (FR)-based circulating tumor cell (CTC) detection method in the diagnosis of lung cancer. CTCs were collected from 3 mL of blood ba
Externí odkaz:
https://doaj.org/article/6eda4d0555d543a8b2a268325feb5933
Publikováno v:
Sensors, Vol 18, Iss 11, p 3962 (2018)
This study investigates the randomness detection of cryptographic algorithms in network security. To effectively test and verify the security of ZigBee protocol in the Internet of Things, the study combines with the characteristics of ZigBee networks
Externí odkaz:
https://doaj.org/article/4895e52646004c88a449400205f7a5b4
Publikováno v:
IEEE Internet of Things Journal. 10:4725-4734
Publikováno v:
AAAI
For cross-modal subspace clustering, the key point is how to exploit the correlation information between cross-modal data. However, most hierarchical and structural correlation information among cross-modal data cannot be well exploited due to its hi
Autor:
Cheng Liu, Huanhuan Liang, Runze Xie, Quanfeng Zhou, Miao Qi, Chongqing Yang, Xiaodan Gu, Yunfei Wang, Guoxiang Zhang, Jinlun Li, Xiu Gong, Junwu Chen, Lianjie Zhang, Zesheng Zhang, Xiang Ge, Yuanyu Wang, Chen Yang, Yi Liu, Xuncheng Liu
Publikováno v:
Advanced Science, Vol 11, Iss 25, Pp n/a-n/a (2024)
Abstract The development of semiconducting polymers with good processability in green solvents and competitive electrical performance is essential for realizing sustainable large‐scale manufacturing and commercialization of organic electronics. A m
Externí odkaz:
https://doaj.org/article/1f6b33c14a8d43bca50b91a1463509f3
Publikováno v:
Advances in Computers ISBN: 9780128211472
Verifier-based Password Authenticated Key Exchange (VPAKE) protocol enables users to generate a session key over insecure channels, which can limit the impact of server's information leakage. However, most existing VPAKE protocols are based on the in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::19db6c41eaba1cdf090e973ac4b2547d
https://doi.org/10.1016/bs.adcom.2020.09.003
https://doi.org/10.1016/bs.adcom.2020.09.003
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884277
ESORICS (2)
ESORICS (2)
Identity-based authenticated key exchange (ID-AKE) allows two parties (whose identities are just their public keys) to agree on a shared session key over open channels. At ESORICS 2019, Tomida et al. proposed a highly efficient ID-AKE protocol, refer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::648ea3e97835f3962dfd4070b05df504
https://doi.org/10.1007/978-3-030-88428-4_32
https://doi.org/10.1007/978-3-030-88428-4_32