Academic literature on the topic 'Interlock Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Interlock Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Interlock Protocol"
Paulanda, Jepri. "PENERAPAN INTERLOCK PROTOCOL DALAM PENCEGAHAN MAN-IN-THE-MIDDLE-ATTACK." JURNAL MAHAJANA INFORMASI 1, no. 2 (2018): 31–41. http://dx.doi.org/10.51544/jurnalmi.v1i2.168.
Full textPasaribu, Maranata, and Marice Hotnauli Simbolon. "Perancangan Simulator Interlock Protocol saat Serangan Man-in-the-Middle-Attack pada Kriptografi Kunci Publik RSA." LOFIAN: Jurnal Teknologi Informasi dan Komunikasi 1, no. 1 (2021): 1–6. http://dx.doi.org/10.58918/lofian.v1i1.157.
Full textTae-Ho, Cho, and Jeon Garam-Moe. "DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS." International Journal of Research – Granthaalayah 4, no. 2 (2017): 151–58. https://doi.org/10.5281/zenodo.848114.
Full textCho, Tae-Ho, and Garam-Moe Jeon. "DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS." International Journal of Research -GRANTHAALAYAH 4, no. 2 (2016): 151–58. http://dx.doi.org/10.29121/granthaalayah.v4.i2.2016.2825.
Full textBellovin, S. M., and M. Merritt. "An attack on the Interlock Protocol when used for authentication." IEEE Transactions on Information Theory 40, no. 1 (1994): 273–75. http://dx.doi.org/10.1109/18.272497.
Full textBAX, H., and U. WÄTJEN. "AUTOMATIZATION OF A PIXE SYSTEM FOR SERIES OF BIO-MEDICAL AND ENVIRONMENTAL ANALYSES." International Journal of PIXE 02, no. 03 (1992): 285–97. http://dx.doi.org/10.1142/s0129083592000294.
Full textFeng, Jianyu, Yidong Yuan, Tianting Zhao, Xin Yang, Fang Liu, and Yue Zhuo. "Implementation of an Isolated I2C Interface Device Based on OOK Codec." Journal of Physics: Conference Series 2378, no. 1 (2022): 012045. http://dx.doi.org/10.1088/1742-6596/2378/1/012045.
Full textSVOZIL, KARL. "FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY." International Journal of Quantum Information 03, no. 04 (2005): 649–54. http://dx.doi.org/10.1142/s0219749905001511.
Full textFotohi, Reza, Somayyeh Firoozi Bari, and Mehdi Yusefi. "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol." International Journal of Communication Systems 33, no. 4 (2019): e4234. http://dx.doi.org/10.1002/dac.4234.
Full textLi, J., P. Cao, Y. Wang, and W. Wang. "A clock synchronization and trigger distribution scheme for China Spallation Neutron Source." Journal of Instrumentation 19, no. 06 (2024): P06039. http://dx.doi.org/10.1088/1748-0221/19/06/p06039.
Full textBook chapters on the topic "Interlock Protocol"
Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.
Full textEnglund, Paul T., D. Lys Guilbride, kuo-yuan hwa, et al. "Kinetoplast DNA: structure and replication." In Molecular Biology of Parasitic Protozoa. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780199636020.003.0005.
Full textConference papers on the topic "Interlock Protocol"
Angula, Nikodemus, and Nomusa Dlodlo. "Towards the Development of an Interlink Protocol for Disease Surveillance Data Aggregation: A Namibian Context." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601209.
Full textHübner, A., A. C. R. Costa, G. P. Dimuro, V. L. D. Mattos, S. S. Hernandes, and M. M. Lange. "Introdução da Dimensão Dialógica no Moise+, com Aplicação na Modelagem de Processos de Gestão em uma Universidade Comunitária." In Workshop-Escola de Sistemas de Agentes, seus Ambientes e Aplicações. Sociedade Brasileira de Computação, 2010. https://doi.org/10.5753/wesaac.2010.33054.
Full text