Academic literature on the topic 'Strengthening protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strengthening protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Strengthening protocol"
Zhang, Bo, Wei-Xu Shi, Jian Wang, and Chao-Jing Tang. "Quantum direct communication protocol strengthening against Pavičić’s attack." International Journal of Quantum Information 13, no. 07 (2015): 1550052. http://dx.doi.org/10.1142/s0219749915500525.
Full textLi, Yongjian, Bohua Zhan, and Jun Pang. "Mechanizing the CMP Abstraction for Parameterized Verification." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1324–50. http://dx.doi.org/10.1145/3649858.
Full textKrzywiecki, Łukasz, and Tomasz Wlisłocki. "Deniable Key Establishment Resistance against eKCI Attacks." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/7810352.
Full textShohruh, Ibadullayev Sheraliyevich. "STRENGTHENING IMPLEMENTATION OF WPA3 SECURITY PROTOCOL FOR WIRELESS NETWORK." MEDICINE, PEDAGOGY AND TECHNOLOGY: THEORY AND PRACTICE 3, no. 1 (2025): 36–41. https://doi.org/10.5281/zenodo.14620126.
Full textTao, Jiaye, Chao Hong, Yun Fu, et al. "Coverage-guided fuzz testing method based on reinforcement learning seed scheduling." Journal of Physics: Conference Series 2816, no. 1 (2024): 012107. http://dx.doi.org/10.1088/1742-6596/2816/1/012107.
Full textFerber, Reed, Lori Bolgla, Jennifer E. Earl-Boehm, Carolyn Emery, and Karrie Hamstra-Wright. "Strengthening of the Hip and Core Versus Knee Muscles for the Treatment of Patellofemoral Pain: A Multicenter Randomized Controlled Trial." Journal of Athletic Training 50, no. 4 (2015): 366–77. http://dx.doi.org/10.4085/1062-6050-49.3.70.
Full textHermanns, Christina, Reed Coda, Sana Cheema, et al. "Variability in Rehabilitation Protocols after Superior Labrum Anterior Posterior Surgical Repair." Kansas Journal of Medicine 14 (October 14, 2021): 243–48. http://dx.doi.org/10.17161/kjm.vol14.15286.
Full textJellad, Anis, Amine Kalai, Mohamed Guedria, et al. "Combined Hip Abductor and External Rotator Strengthening and Hip Internal Rotator Stretching Improves Pain and Function in Patients With Patellofemoral Pain Syndrome: A Randomized Controlled Trial With Crossover Design." Orthopaedic Journal of Sports Medicine 9, no. 4 (2021): 232596712198972. http://dx.doi.org/10.1177/2325967121989729.
Full textImeri, Behrooz, and Mehdi Gheitasi. "Hip Abductor Muscles Strengthening's Effect on Lower Extremity's Function of Runners With Illitotibial Syndrome." Journal of Exercise Science and Medicine 12, no. 1 (2020): 189–200. http://dx.doi.org/10.32598/jesm.12.1.6.
Full textStephen, Geovinson George, Kamalakannan Mohanan, Praveen Kumar Kandakurti, and Ramprasad Mathukrishnan. "Comparative analysis of the effects of real-time audio-visual feedback, yoga and pressure biofeedback stabilizer in core strengthening: a randomised controlled trial." Biomedical Human Kinetics 17, no. 1 (2025): 135–46. https://doi.org/10.2478/bhk-2025-0013.
Full textDissertations / Theses on the topic "Strengthening protocol"
Robinson, Elena Ann Robinson. "The use of kinesio tape, with a strengthening protocol, in aiding scapular retraction through facilitation of the rhomboids." Marietta College Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=marhonors1524836295349199.
Full textHlabangana, Verna Ntombikayise. "Will the SADC Protocol on Trade in Services be effective in meeting its objectives of strengthening the region's services market?" Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/64610.
Full textSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Full textBuchmann, Nicolas [Verfasser]. "Strengthening trust in the identity life cycle : Enhancing electronic machine readable travel documents due to advances in security protocols and infrastructure / Nicolas Buchmann." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1180387961/34.
Full text"The effect of the chiropractic adjustment with a strengthening protocol compared to chiropractic adjustment or a strengthening protocol alone." Thesis, 2009. http://hdl.handle.net/10210/2999.
Full textPearson, Graham S., Malcolm R. Dando, and N. A. Sims. "The Composite Protocol Text: An Effective Strengthening of the Biological and Toxin Weapons Convention." 2001. http://hdl.handle.net/10454/839.
Full textBooks on the topic "Strengthening protocol"
Europe, Council of. Second Additional Protocol to the Convention on Cybercrime Concerning the Strengthening of Cooperation and the Disclosure of Electronic Evidence: Strasbourg, 12. 5. 2022. Council of Europe, 2022.
Find full textBroussal-Derval, Aurélien. Training and Conditioning for Judo. Human Kinetics, 2019. http://dx.doi.org/10.5040/9781718225732.
Full textBook chapters on the topic "Strengthening protocol"
Zawadzki, Piotr. "Ping-Pong Protocol Strengthening against Pavičić’s Attack." In Computer Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7_21.
Full textStolk, Elly, Juan Manuel Ramos-Goñi, Kristina Ludwig, Mark Oppe, and Richard Norman. "The Development and Strengthening of Methods for Valuing EQ-5D-5L – An Overview." In Value Sets for EQ-5D-5L. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89289-0_2.
Full textShrikrishna, Khedkar, N. V. Narendra Kumar, and R. K. Shyamasundar. "Security Analysis of EMV Protocol and Approaches for Strengthening It." In Distributed Computing and Internet Technology. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72344-0_4.
Full textGarba, Faisal, and Thomas Yeboah. "Free Movement and Regional Integration in the ECOWAS Sub-Region." In IMISCOE Research Series. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97322-3_2.
Full textRattal, Salma, Isabelle Lajoie, Omar Sefraoui, Kamal Ghoumid, Réda Yahiaoui, and El Miloud Ar-Reyouchi. "A Resilient and Efficient Protocol for Strengthening the Internet of Things Network Performance." In IoT Based Control Networks and Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5845-8_51.
Full textGaray, Juan A., Philip MacKenzie, and Ke Yang. "Strengthening Zero-Knowledge Protocols Using Signatures." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-39200-9_11.
Full textMao, Wenbo, and Colin Boyd. "On strengthening authentication protocols to foil cryptanalysis." In Computer Security — ESORICS 94. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58618-0_64.
Full textWang, Peng, Yongdae Kim, Vishal Kher, and Taekyoung Kwon. "Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_2.
Full textTapiola, Kari. "What Happened to International Labour Standards and Human Rights at Work?" In International Labour Organization and Global Social Governance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55400-2_3.
Full textPapadakis, Athanasios, Antonios Lalas, Sofia Petridou, Konstantinos Votis, and Dimitrios Tzovaras. "Technical Cybersecurity Implementation on Automated Minibuses with Security Information and Event Management (SIEM)." In Contributions to Management Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61681-5_7.
Full textConference papers on the topic "Strengthening protocol"
Hariharasudhan, S., Vineetha Varghese, K. Malarvizhi, S. P. Santhoshkumar, T. Nalini, and D. Vikram. "Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823200.
Full textRaghavendran, Prabakaran, Tharmalingam Gunasekar, and Saikat Gochhait. "Strengthening Cryptographic Protocols: Leveraging the Soham Transform’s Unique Capabilities." In 2024 5th International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2024. https://doi.org/10.1109/icdabi63787.2024.10800575.
Full textKumara, Bharath, Pareshwar Prasad Barmola, Renuka Arora, Swapnil M. Parikh, and Ramya Maranan. "AI-Enhanced Virtual Twin Modelling for Strengthening IoT Software Security Protocols." In 2024 First International Conference on Software, Systems and Information Technology (SSITCON). IEEE, 2024. https://doi.org/10.1109/ssitcon62437.2024.10796126.
Full textMoradi, Fereidoun, Hamid Mala, and Behrouz Tork Ladani. "Cryptanalysis and strengthening of SRP+ protocol." In 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). IEEE, 2015. http://dx.doi.org/10.1109/iscisc.2015.7387904.
Full textBuccafurri, Francesco, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia Labrini. "WIP: An Onion-Based Routing Protocol Strengthening Anonymity." In 2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2021. http://dx.doi.org/10.1109/wowmom51794.2021.00041.
Full textSjoholmsierchio, Michael, Britta Hale, Daniel Lukaszewski, and Geoffrey Xie. "Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks." In 2021 IEEE 7th International Conference on Network Softwarization (NetSoft). IEEE, 2021. http://dx.doi.org/10.1109/netsoft51509.2021.9492614.
Full textTunnicliffe, Martin J., Omego Obinna, and Eckhard Pflucgel. "Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces." In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688025.
Full textArzaki, Muhammad. "Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack." In 2018 6th International Conference on Information and Communication Technology (ICoICT). IEEE, 2018. http://dx.doi.org/10.1109/icoict.2018.8528731.
Full textGupta, Rajesh, Nilesh Kumar Jadav, Sudeep Tanwar, and Anand Nayyar. "Blockchain and AI-assisted Onion Routing Protocol for Strengthening Anonymity in Beyond 5G IoMVs Networks." In ICIIT 2023: 2023 8th International Conference on Intelligent Information Technology. ACM, 2023. http://dx.doi.org/10.1145/3591569.3591582.
Full textNugroho, Herjuno Ari, Dian Fitria Agustiyanti, Marissa Angelina, Ratih Asmana Ningrum, Silmi Rahmani, and Popi Hadi Wisnuwardhani. "Biosafety protocol verification to inactivate Indonesian isolate SARS CoV-2 using formaldehyde." In PROCEEDINGS OF THE 9TH INTERNATIONAL SYMPOSIUM ON INNOVATIVE BIOPRODUCTION INDONESIA ON BIOTECHNOLOGY AND BIOENGINEERING 2022: Strengthening Bioeconomy through Applied Biotechnology, Bioengineering, and Biodiversity. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0183716.
Full textReports on the topic "Strengthening protocol"
Chen, Botao, Xiaohong Fan, Tong Li, et al. Spine strengthening exercise for treating aged hyperkyphosis: a protocol of systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2020. http://dx.doi.org/10.37766/inplasy2020.12.0091.
Full textBozek, Michael, and Tani Hubbard. Greater Yellowstone Network amphibian monitoring protocol science review: A summary of reviewers’ responses. National Park Service, 2022. http://dx.doi.org/10.36967/nrr-2293614.
Full textMarto, Ricardo, Paola Buitrago, Agustina Schijman, et al. Country Program Evaluation: Jamaica 2009-2014. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0010600.
Full textHrynick, Tabitha, Santiago Ripoll, and Janine Shaw. Strengthening Community and Community Engagement Infrastructure for Better Pandemic and Emergency Preparedness at the Local Level. Institute of Development Studies, 2025. https://doi.org/10.19088/ids.2025.005.
Full textEparkhina, Dina. EuroSea Legacy Report. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d8.12.
Full textPoverenov, Elena, Tara McHugh, and Victor Rodov. Waste to Worth: Active antimicrobial and health-beneficial food coating from byproducts of mushroom industry. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7600015.bard.
Full textSoldano, Miguel, Michelle Fryer, Ana María Linares, et al. Country Program Evaluation: Panama (2010-2014). Inter-American Development Bank, 2015. http://dx.doi.org/10.18235/0010618.
Full textYeika, Eugene, Erica L. Kocher, and Carrie Ngongo. Integrating Noncommunicable Diseases into Antenatal Care in Cameroon: A Triangulated Qualitative Analysis. RTI Press, 2024. http://dx.doi.org/10.3768/rtipress.2024.rr.0051.2401.
Full textMelad, Kris Ann. Harmonizing Philippine Census Data across Decades (1970–2020). Philippine Institute for Development Studies, 2024. https://doi.org/10.62986/dp2024.44.
Full textLim, Jeehee, Rodrigo Salgado, Monica Prezzi, Yao Wang, and Fei Han. Development of Protocols for Reuse Assessment of Existing Foundations in Bridge Rehabilitation and Replacement Projects. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317654.
Full text