Academic literature on the topic 'No Key-Exchange'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'No Key-Exchange.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "No Key-Exchange"
Jeong, Ik, and Dong Lee. "Parallel Key Exchange." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 377–96. https://doi.org/10.3217/jucs-014-03-0377.
Full textIssa, Mohaned, and Adil Alramahi. "Using Diffie-Hellman Key - Exchange in RADG." International Journal of Scientific Engineering and Research 6, no. 9 (2018): 56–58. https://doi.org/10.70729/ijser18168.
Full textSaraswathi, K., B. Jayaram, and R. Balasubramanian. "Iris Biometrics Based Authentication and Key Exchange System." International Journal of Engineering and Technology 3, no. 1 (2011): 102–8. http://dx.doi.org/10.7763/ijet.2011.v3.207.
Full textMoreau, T. "Probabilistic encryption key exchange." Electronics Letters 31, no. 25 (1995): 2166–68. http://dx.doi.org/10.1049/el:19951499.
Full textGonzález Vasco, Maria Isabel, Angel Luis Pérez del Pozo, and Adriana Suárez Corona. "Group key exchange protocols withstanding ephemeral-key reveals." IET Information Security 12, no. 1 (2018): 79–86. http://dx.doi.org/10.1049/iet-ifs.2017.0131.
Full textLee, Yung-Cheng, and Chi-Sung Laih. "On the key escrow system without key exchange." Computers & Electrical Engineering 25, no. 4 (1999): 279–90. http://dx.doi.org/10.1016/s0045-7906(99)00013-0.
Full textAlvarez, Rafael, Cándido Caballero-Gil, Juan Santonja, and Antonio Zamora. "Algorithms for Lightweight Key Exchange †." Sensors 17, no. 7 (2017): 1517. http://dx.doi.org/10.3390/s17071517.
Full textMeshram, A. J., C. Meshram, S. D. Bagde, and R. R. Meshram. "RIPIC BASED KEY EXCHANGE PROTOCOL." Advances in Mathematics: Scientific Journal 9, no. 12 (2020): 11169–77. http://dx.doi.org/10.37418/amsj.9.12.97.
Full textLin, Chun-Li, Hung-Min Sun, and Tzonelih Hwang. "Three-party encrypted key exchange." ACM SIGOPS Operating Systems Review 34, no. 4 (2000): 12–20. http://dx.doi.org/10.1145/506106.506108.
Full textZhang, Yuexin, Yang Xiang, and Xinyi Huang. "Password-Authenticated Group Key Exchange." ACM Transactions on Internet Technology 16, no. 4 (2016): 1–20. http://dx.doi.org/10.1145/2955095.
Full textDissertations / Theses on the topic "No Key-Exchange"
Kurt, Yesem. "New key exchange primitives." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243768.
Full textManulis, Mark. "Provably secure group key exchange." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2993029&prov=M&dok_var=1&dok_ext=htm.
Full textSoltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Full textUslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.
Full textWilliams, Stephen C. "On the security of key exchange protocols." Thesis, University of Bristol, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.556744.
Full textGarratt, Luke. "Realistic, strong and provable key exchange security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:389973d5-9c96-4905-b412-2514578abf20.
Full textShah, Illana. "Quantum key exchange and mutually unbiased bases." Thesis, Royal Holloway, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497647.
Full textZhang, J. "Authenticated key exchange protocols with unbalanced computational requirements." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3025159/.
Full textSnook, Michael. "Quantum Resistant Authenticated Key Exchange from Ideal Lattices." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1470757378.
Full textAl-Ismaily, Nasser. "Dynamic block encryption with self-authenticating key exchange." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7825.
Full textBooks on the topic "No Key-Exchange"
Mattione, Richard P. The impact of exchange rate changes in key currencies on trade. South East Asian Central Banks, Research and Training Centre, 1987.
Find full textArgy, Victor E. Choice of exchange rate regime for a smaller economy: A survey of some key issues. Macquarie University, School of Economic & Financial Studies, 1989.
Find full textEdwards, Melvin D. NAWDEX: A key to finding water data. U.S. Dept. of the Interior, Geological Survey, 1987.
Find full textReisen, Helmut. Key prices for adjustment towards less external indebtedness. Development Centre of the Organisation for Economic Co-operation and Development, 1985.
Find full textAhmed, Sadiq. How Indonesia's monetary policy affects key variables. Asia Regional Office, Country Dept. V, World Bank, 1990.
Find full textRenton, N. E. Understanding the Australian economic debate: A lucid and opinionated primer to the key economic issues facing Australia in the 1990's. Including explanation and commentary on tax, wages, interest rates, housing, social securities, inflation, exchange rates, privatisation etc. Australian Investment Library, 1990.
Find full textAtkin, John. Economic and monetary union: Key implications for your business. Thorogood, 1998.
Find full textKrämer, Sybille. Medium, Messenger, Transmission. Amsterdam University Press, 2016. http://dx.doi.org/10.5117/9789462983083.
Full textCappellini, Vito, ed. Electronic Imaging & the Visual Arts. EVA 2012 Florence. Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-130-0.
Full textBook chapters on the topic "No Key-Exchange"
Weik, Martin H. "key-exchange key." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9794.
Full textWeik, Martin H. "exchange key." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6494.
Full textBuchanan, William J. "Key Exchange." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-6.
Full textGjøsteen, Kristian. "Key Exchange." In Practical Mathematical Cryptography. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003149422-10.
Full textSchneier, Bruce. "Key-Exchange Algorithms." In Applied Cryptography, Second Edition. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch22.
Full textFreire, Eduarda S. V., Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson. "Non-Interactive Key Exchange." In Public-Key Cryptography – PKC 2013. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36362-7_17.
Full textDodis, Yevgeniy, and Dario Fiore. "Unilaterally-Authenticated Key Exchange." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70972-7_31.
Full textMizuki, Takaaki, Hiroki Shizuya, and Takao Nishizeki. "Eulerian Secret Key Exchange." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68535-9_39.
Full textYao, Andrew C., and Yunlei Zhao. "Deniable Internet Key Exchange." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13708-2_20.
Full textBirkett, James, and Douglas Stebila. "Predicate-Based Key Exchange." In Information Security and Privacy. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14081-5_18.
Full textConference papers on the topic "No Key-Exchange"
Sarojam Chellam, Manjith Baby, Ramasubramanian Natarajan, and Nagi Naganathan. "Secure key exchange protocol and storage of logic locking key." In 2024 28th International Symposium on VLSI Design and Test (VDAT). IEEE, 2024. http://dx.doi.org/10.1109/vdat63601.2024.10705695.
Full textArjun, Anapalli, Sandhiya A, and SK Uma Maheswaran. "Idle Key Distribution Protocol for Efficient Quantum Key Exchange in Dynamic Networks." In 2025 International Conference on Computing and Communication Technologies (ICCCT). IEEE, 2025. https://doi.org/10.1109/iccct63501.2025.11019788.
Full textGupta, Siddharth, Sahithya Kodam, and Baijian Yang. "Multichannel key exchange." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. ACM, 2017. http://dx.doi.org/10.1145/3018896.3025145.
Full textGünther, Felix, Douglas Stebila, and Shannon Veitch. "Obfuscated Key Exchange." In CCS '24: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2024. https://doi.org/10.1145/3658644.3690220.
Full textBellovin, Steven M., and Michael Merritt. "Augmented encrypted key exchange." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168618.
Full textSreeDeepika, M., N. Sri Lekhya, Likesh K, and Shinu M. Rajagopal. "Implementing Internet Key Exchange with Image-based Key Exchange through Socket Programming." In 2024 IEEE 9th International Conference for Convergence in Technology (I2CT). IEEE, 2024. http://dx.doi.org/10.1109/i2ct61223.2024.10544262.
Full textYi, Tong, Minyong Shi, and Wenqian Shang. "Key exchange protocol based on the private key." In 2015 International Conference on Automation, Mechanical Control and Computational Engineering. Atlantis Press, 2015. http://dx.doi.org/10.2991/amcce-15.2015.6.
Full textKobara, Kazukuni, Seonghan Shin, and Mario Strefler. "Partnership in key exchange protocols." In the 4th International Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533081.
Full textPortnoi, Marcos, and Chien-Chung Shen. "Location-enhanced authenticated key exchange." In 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2016. http://dx.doi.org/10.1109/iccnc.2016.7440584.
Full textCostea, Sergiu, Marios O. Choudary, Doru Gucea, Björn Tackmann, and Costin Raiciu. "Secure Opportunistic Multipath Key Exchange." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3243734.3243791.
Full textReports on the topic "No Key-Exchange"
Harkins, D., ed. Dragonfly Key Exchange. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7664.
Full textHarkins, D., and D. Carrel. The Internet Key Exchange (IKE). RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2409.
Full textKaufman, C., ed. Internet Key Exchange (IKEv2) Protocol. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4306.
Full textCakulev, V., G. Sundaram, and I. Broustis. IBAKE: Identity-Based Authenticated Key Exchange. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6539.
Full textToliver, Paul. SeaQuaKE: Sea-optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605824.
Full textToliver, Paul. SeaQuaKE: Sea-Optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada608175.
Full textToliver, Paul. SeaQuaKE: Sea-optimized Quantum Key Exchange. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada614471.
Full textLadd, W. SPAKE2, a Password-Authenticated Key Exchange. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9382.
Full textAtkinson, R. Key Exchange Delegation Record for the DNS. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2230.
Full textWu, T. The SRP Authentication and Key Exchange System. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2945.
Full text