Zobrazeno 1 - 10
of 1 719
pro vyhledávání: '"identification scheme"'
Publikováno v:
IET Generation, Transmission & Distribution, Vol 17, Iss 16, Pp 3718-3738 (2023)
Abstract A fault properties identification scheme for a hybrid multi‐terminal DC (MTDC) system is proposed to improve the power supply reliability in the system recovery stage. Firstly, a current signal injection strategy based on line commutated c
Externí odkaz:
https://doaj.org/article/c3a991b9b04b4d6eb64817b42a10f299
Autor:
Hubenova, Margarita
Publikováno v:
Съвременно право / Contemporary Law. (3):30-40
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1099133
Autor:
Vaishnavi Nagaraja, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nurul Nur Hanisah Adenan, Ji-Jian Chin, Sook-Chin Yip, Timothy Tzen Vun Yap
Publikováno v:
Mathematics, Vol 11, Iss 5, p 1139 (2023)
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to conv
Externí odkaz:
https://doaj.org/article/f017742270784ba48a1614fea5d86bf1
Autor:
Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Siti Hasana Sapar, Mohamat Aidil Mohamat Johari
Publikováno v:
Symmetry, Vol 14, Iss 9, p 1784 (2022)
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital si
Externí odkaz:
https://doaj.org/article/03ee01cd55f9466a8017af1627e77af4
Autor:
Marinova, Kremena
Publikováno v:
Електронно списание »Диалог« / Dialogue - E-Journal. (03):60-72
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=870557
Autor:
Bagus Santoso, Chunhua Su
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 3, Pp 294-308 (2019)
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only pr
Externí odkaz:
https://doaj.org/article/4202a649cd0446648e5b7e44bc9c9a74
Publikováno v:
Panahi, H, Sanaye-Pasand, M, Ashrafi Niaki, S H & Zamani, R 2022, ' Fast Low Frequency Fault Location and Section Identification Scheme for VSC-Based Multi-Terminal HVDC Systems ', IEEE Transactions on Power Delivery, vol. 37, no. 3, pp. 2220-2229 . https://doi.org/10.1109/TPWRD.2021.3107513
Penetration of DC networks is rapidly increasing in modern power systems. As transient behavior of DC grids is different from that of AC ones, AC grid protection schemes might not be applicable to protect DC networks. Exact fault location is vital fo
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Nurul Nur Hanisah Adenan, MUHAMMAD REZAL KAMEL ARIFFIN, Sook Chin Yip, Ji-Jian Chin, Vaishnavi Nagaraja, Timothy Tzen Vun Yap, Terry Shue Chien Lau
Publikováno v:
Mathematics
Volume 11
Issue 5
Pages: 1139
Volume 11
Issue 5
Pages: 1139
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to conv