Academic literature on the topic 'Session key exchange'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Session key exchange.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Session key exchange"
Pathak, Gaurav, Jairo Gutierrez, Akbar Ghobakhlou, and Saeed Ur Rehman. "LPWAN Key Exchange: A Centralised Lightweight Approach." Sensors 22, no. 13 (2022): 5065. http://dx.doi.org/10.3390/s22135065.
Full textJeong, Ik, and Dong Lee. "Parallel Key Exchange." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 377–96. https://doi.org/10.3217/jucs-014-03-0377.
Full textZhao, Cui Jie, and Guo Zhen Wang. "The Optimization of the Key Exchange Protocol Based on Public Key Certificates in the Internet of Things." Applied Mechanics and Materials 411-414 (September 2013): 629–33. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.629.
Full textJVyas, Pranav, and Bhushan H Trivedi. "Analysis of Key Exchange Protocols using Session Keys." International Journal of Applied Information Systems 1, no. 4 (2012): 35–40. http://dx.doi.org/10.5120/ijais12-450164.
Full textMr., Afsal K1, Fahim2 Mr., Hana Shirin3 Ms., Babu4 Ms.Neshva, and Saiba P. A5 Ms. "AUTHENTICATED KEY EXCHANGE PROTOCOLS USING IMAGE STEGANOGRAPHY." International Journal of Advances in Engineering & Scientific Research 3, no. 5 (2016): 53–59. https://doi.org/10.5281/zenodo.10774411.
Full textVyas, Pranav, Bhushan Trivedi, and Atul Patel. "Simulation Analysis of Session Key Exchange Protocols based on Key Parameters." International Journal of Computer Applications 68, no. 1 (2013): 46–52. http://dx.doi.org/10.5120/11547-6820.
Full textSohail Abid. "Dynamic Session Key Exchange Method Using Two S-Boxes." International Journal of Computer Science, Engineering and Applications 1, no. 6 (2011): 95–104. http://dx.doi.org/10.5121/ijcsea.2011.1608.
Full textXu, Chun Gen, Yan Jiong Yang, and Ben Nian Dou. "Authenticated Session Key Distribution Protocol with Zero-Knowledge." Applied Mechanics and Materials 44-47 (December 2010): 3190–94. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3190.
Full textSathya, S., M. Ranjith Kumar, and K. Madheswaran. "Parallel network file systems using authenticated key exchange protocols." Journal of Applied and Advanced Research 2, no. 3 (2017): 161. http://dx.doi.org/10.21839/jaar.2017.v2i3.89.
Full textJia, Wenjuan, Guanhao Xue, Baocang Wang, and Yupu Hu. "Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism." Security and Communication Networks 2022 (February 1, 2022): 1–7. http://dx.doi.org/10.1155/2022/8299232.
Full textDissertations / Theses on the topic "Session key exchange"
Tsao, Cheng-hao, and 曹正浩. "A Study on Dynamic Session Key Exchange." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71584086761548423916.
Full textWu, Chih-Lung, and 吳志榮. "A Study on Dynamic Session Key Exchange with Pseudo Random Number Scheme in a Cloud Computing Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34595755674316429273.
Full textSoltwisch, Rene Alexander [Verfasser]. "The inter-domain key exchange protocol : a cryptographic protocol for fast, secure session-key establishment and re-authentication of mobile nodes after inter-domain handovers / vorgelegt von Rene Alexander Soltwisch." 2006. http://d-nb.info/979970520/34.
Full textBooks on the topic "Session key exchange"
The Treasury Department's report to Congress on international economic and exchange rate policy (IEERP) and the U.S.-China strategic economic dialogue: Hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Tenth Congress, first session, on reviewing developments in international economics and the exchange rate policies of our key trading partners with an emphasis on the U.S.-China strategic economic dialogue, Wednesday, January 31, 2007. U.S. G.P.O., 2009.
Find full textBook chapters on the topic "Session key exchange"
Tsai, Kun-Lin, Fang-Yie Leu, and Shuo-Wen Chang. "Self-parameter Based Bilateral Session Key Exchange Method." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02613-4_55.
Full textImamoto, Kenji, and Kouichi Sakurai. "Key-Exchange Protocol Using Pre-agreed Session-ID." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_30.
Full textKa, Ahmad Khoureich. "Session-HB: Improving the Security of HB $$^{+}$$ with a Session Key Exchange." In Innovation and Interdisciplinary Solutions for Underserved Areas. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_19.
Full textKim, Hyun Gon, Doo Ho Choi, and Dae Young Kim. "Secure Session Key Exchange for Mobile IP Low Latency Handoffs." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44843-8_25.
Full textKang, Jungho, and Jong Hyuk Park. "Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0281-6_36.
Full textGoswami, Partha Sarathi, Tamal Chakraborty, and Abir Chattopadhyay. "A Nature-Inspired DNA Encoding Technique for Quantum Session Key Exchange Protocol." In Advances in Nature-Inspired Cyber Security and Resilience. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90708-2_7.
Full textGoswami, Partha Sarathi, Tamal Chakraborty, and Abir Chattopadhyay. "A Nature-Inspired DNA Encoding Technique for Quantum Session Key Exchange Protocol." In Advances in Nature-Inspired Cyber Security and Resilience. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90708-2_7.
Full textCremers, Cas J. F. "Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_2.
Full textKim, Hyun Gon, and Doo Ho Choi. "Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Handoff." In Computational Science and Its Applications – ICCSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_129.
Full textYoneyama, Kazuki. "Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles." In Information Security and Cryptology - ICISC 2011. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31912-9_31.
Full textConference papers on the topic "Session key exchange"
Agarwal, Archit, and Amod Kumar. "Encoded IDs symmetric session key exchange." In 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC). IEEE, 2017. http://dx.doi.org/10.1109/icbdaci.2017.8070876.
Full textJadliwala, Murtuza S. "Session details: Authentication and key exchange." In WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2013. http://dx.doi.org/10.1145/3249948.
Full textPinkas, Benny. "Session details: Session 5B: Secure Messaging and Key Exchange." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3432978.
Full textAgarwal, Archit, and Satya Jeet Singh. "Mask IDs based asymmetric session key exchange." In 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC). IEEE, 2017. http://dx.doi.org/10.1109/icbdaci.2017.8070875.
Full textFeigenbaum, Joan. "Session details: Key management, key exchange, & pseudo-random generation." In CCS05: 12th ACM Conference on Computer and Communications Security 2005. ACM, 2005. http://dx.doi.org/10.1145/3249551.
Full textAlKurdi, Ahmad, and Sa'ed Abed. "IoT Lightweight Session Key Exchange to Improve Security Scheme." In 2023 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2023. http://dx.doi.org/10.1109/csci62032.2023.00163.
Full textTizazu, Gebere Akele, Hassen Redwan Hussen, and Ki-Hyung Kim. "Secure session key exchange scheme for Smart Grid Home Area Networks." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675571.
Full textAbla, Parhat. "Lattice Based Group Key Exchange Protocol in the Standard Model." In 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111113.
Full textZgureanu, Aureliu. "A key exchange method based on Boolean functions as subsets of columns." In 26th International Scientific Conference “Competitiveness and Innovation in the Knowledge Economy". Academy of Economic Studies of Moldova, 2023. http://dx.doi.org/10.53486/cike2022.39.
Full textHyosun Roh and Souhwan Jung. "Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks." In 2010 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2010. http://dx.doi.org/10.1109/ictc.2010.5674797.
Full textReports on the topic "Session key exchange"
Sheffer, Y., and H. Tschofenig. Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5723.
Full textSaito, M., D. Wing, and M. Toyama. Media Description for the Internet Key Exchange Protocol (IKE) in the Session Description Protocol (SDP). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6193.
Full textShannon, Caitlin S., and Beverly Winikoff. Misoprostol: An emerging technology for women's health—Report of a seminar. Population Council, 2004. http://dx.doi.org/10.31899/rh17.1002.
Full textMensah-Sackey, Anna. Weapon and Ammunition Management in Africa: Online Meeting Summary. UNIDIR, 2020. http://dx.doi.org/10.37559/caap/20/wam/05.
Full textde Jesus, Ana, and Sara Melander. From Vision to Practice – Insights from Nordic-Baltic 5G applications across sectors. Nordregio, 2024. http://dx.doi.org/10.6027/r2024:111403-2503.
Full text