Journal articles on the topic 'Three Pass Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Three Pass Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Baissalov, Yerzhan R., and Ulan Dauyl. "Notes on three-pass protocol." Herald of Omsk University 25, no. 4 (2020): 4–9. http://dx.doi.org/10.24147/1812-3996.2020.25(4).4-9.
Full textSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 442–49. https://doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Full textRobbi, Rahim, and Ikhwan Ali. "Study of Three Pass Protocol on Data Security." International Journal of Science and Research (IJSR) 5, no. 11 (2016): 102–4. https://doi.org/10.21275/ART20162670.
Full textSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Full textZ. Khalaf, Rifaat, Sarkesh K. Ridha, Adel A. Abed Al-Wahab, and Mohamed Khudhair Al-Gburi. "Implementation Three Pass Protocol on Multiplicative Cipher." Journal of Engineering and Applied Sciences 14, no. 9 (2020): 10669–72. http://dx.doi.org/10.36478/jeasci.2019.10669.10672.
Full textNababan, Darsono, and Robbi Rahim. "Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol." Journal of Physics: Conference Series 1175 (March 2019): 012111. http://dx.doi.org/10.1088/1742-6596/1175/1/012111.
Full textRASULOVA, Mukhayo Yunusovna. "New Three-Pass Protocol for Time Dependent Information." EURAS Journal of Engineering and Applied Sciences 2, no. 1 (2021): 31–43. http://dx.doi.org/10.17932/ejeas.2021.024/ejeas_v02i1003.
Full textRahim, Robbi, Nik Adilah Hanin Zahri, and Mohd Nazri Bin Mohd Warip. "Additional Security using Three-Pass Protocol and Pohlig-Hellman." IOP Conference Series: Materials Science and Engineering 1088, no. 1 (2021): 012046. http://dx.doi.org/10.1088/1757-899x/1088/1/012046.
Full textOktaviana, Boni, and Andysah Putera Utama Siahaan. "Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography." IOSR Journal of Computer Engineering 18, no. 04 (2016): 26–29. http://dx.doi.org/10.9790/0661-1804032629.
Full textBadawi, A., M. Zarlis, and S. Suherman. "Impact three pass protocol modifications to key transmission performance." Journal of Physics: Conference Series 1235 (June 2019): 012050. http://dx.doi.org/10.1088/1742-6596/1235/1/012050.
Full textRahim, Robbi. "Applied Pohlig-Hellman algorithm in three-pass protocol communication." Journal of Applied Engineering Science 16, no. 3 (2018): 424–29. http://dx.doi.org/10.5937/jaes16-16557.
Full textNasution, Darmeli, Indri Sulistianingsih, and Arie Candra Panjaitan. "Kombinasi Vigenère dan Beaufort Cipher Konsep Simulasi Three-pass Protocol pada Data Penerbangan." CICES 9, no. 2 (2023): 165–73. http://dx.doi.org/10.33050/cices.v9i2.2699.
Full textHabib, Hamza. "The Application of Chebyshev Polynomial on the Three-Pass Protocol." Diyala Journal for Pure Science 18, no. 3 (2022): 40–51. http://dx.doi.org/10.24237/djps.1803.587a.
Full textS. Azez, Aqeel. "New Approach of RSA Algorithm based on Three-Pass Protocol." Journal of Engineering and Applied Sciences 14, no. 21 (2019): 7913–16. http://dx.doi.org/10.36478/jeasci.2019.7913.7916.
Full textKumar, Gautam, Hemraj Saini, and Vipin Balyan. "Authenticated Quantum Three Pass Protocol on One-Time Pad Cryptographic Technique." HELIX 11, no. 6 (2021): 18–23. http://dx.doi.org/10.29042/2021-11-6-18-23.
Full textGupta, Rajeev Kumar, R. K. Pateriya, and Ankita Patil. "Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol." International Journal of Security and Its Applications 11, no. 1 (2017): 219–32. http://dx.doi.org/10.14257/ijsia.2017.11.1.18.
Full textRidho, Abdurrahman, Cut Mutia, and Andriani Putri. "Konsep Three-Pass Protocol Pengamanan Teks Menggunakan Metode Playfair Cipher Dengan Gronsfeld Cipher." Technologia : Jurnal Ilmiah 14, no. 1 (2023): 27. http://dx.doi.org/10.31602/tji.v14i1.9236.
Full textAbdullah, Alharith A., Rifaat Khalaf, and Mustafa Riza. "A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm." Mathematical Problems in Engineering 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/481824.
Full textRachmawati, Dian, Amer Sharif, and Rosalia Sianipar. "A combination of vigenere algorithm and one time pad algorithm in the three-pass protocol." MATEC Web of Conferences 197 (2018): 03008. http://dx.doi.org/10.1051/matecconf/201819703008.
Full textRahim, R., M. A. Rosid, A. S. Fitrani, A. Daengs GS, and N. L. W. S. R. Ginantra. "Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher." Journal of Physics: Conference Series 1402 (December 2019): 066045. http://dx.doi.org/10.1088/1742-6596/1402/6/066045.
Full textYounis, Mohammed Issam, and Mustafa Hashim Abdulkareem. "ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems." Wireless Personal Communications 96, no. 1 (2017): 65–101. http://dx.doi.org/10.1007/s11277-017-4152-0.
Full textXia, Hui. "Research on Multiple Security Authentication Protocol in RFID System." Applied Mechanics and Materials 457-458 (October 2013): 770–73. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.770.
Full textMezher, Liqaa Saadi, and Ayam Mohsen Abbass. "Mixed Hill Cipher methods with triple pass protocol methods." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4449. http://dx.doi.org/10.11591/ijece.v11i5.pp4449-4457.
Full textLiqaa, Saadi Mezher, and Mohsen Abbass Ayam. "Mixed Hill Cipher methods with triple pass protocol methods." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4449–57. https://doi.org/10.11591/ijece.v11i5.pp4449-4457.
Full textRachmawati, D., M. A. Budiman, and L. Aulya. "Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm." IOP Conference Series: Materials Science and Engineering 308 (February 2018): 012003. http://dx.doi.org/10.1088/1757-899x/308/1/012003.
Full textAbobo, Tom Jericho L., Judy Ann T. Ng, Carmelito N. Longcop, Jr., et al. "Comparing Genomic DNA Extraction Methods/ Protocols to obtain High Quality DNA from Ulva lactuca." Asian Journal of Research in Biochemistry 15, no. 1 (2025): 63–70. https://doi.org/10.9734/ajrb/2025/v15i1351.
Full textSubandi, Amin, Rini Meiyanti, Cut Lika Mestika Sandy, and Rahmat Widia Sembiring. "Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (2017): 1–5. http://dx.doi.org/10.25046/aj020501.
Full textRachmawati, Dian, Mohammad Andri Budiman, and M. Adib Rikzan. "Analysis of File Security with Three-Pass Protocol Scheme Using Massey-Omura Algorithm In Android." Journal of Physics: Conference Series 1235 (June 2019): 012075. http://dx.doi.org/10.1088/1742-6596/1235/1/012075.
Full textHarahap, Muhammad Ikhwan, Suherman Suherman, and Rahmat W. Sembiring. "Three Pass Protocol for Key Security Using Affine Cipher Algortima and Exclusive-or (Xor) Combination." sinkron 8, no. 4 (2023): 2602–14. http://dx.doi.org/10.33395/sinkron.v8i4.13051.
Full textFaraghat, Shabnam A., Kai F. Hoettges, Max K. Steinbach, et al. "High-throughput, low-loss, low-cost, and label-free cell separation using electrophysiology-activated cell enrichment." Proceedings of the National Academy of Sciences 114, no. 18 (2017): 4591–96. http://dx.doi.org/10.1073/pnas.1700773114.
Full textNithya, S., and K. Meena alias Jeyanthi. "Genetic algorithm based bacterial foraging optimization with three-pass protocol concept for heterogeneous network security enhancement." Journal of Computational Science 21 (July 2017): 275–82. http://dx.doi.org/10.1016/j.jocs.2017.03.023.
Full textSingh, Sanjay, and Pradeep B.H. "Three Way Authentication Protocol for Privacy Preserving and Ownership Authentication Transfer for Ubiquitous Computing Devices." WSEAS Transactions on Communications 13 (September 1, 2014): 430——443. https://doi.org/10.5281/zenodo.45486.
Full textPurnomo Sidik, Agung, Syahril Efendi, and Suherman Suherman. "Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms." Journal of Physics: Conference Series 1235 (June 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1235/1/012007.
Full textYang, Chun-Wei, Jason Lin, Chia-Wei Tsai, and Ching-Lin Cheng. "Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States." Entropy 24, no. 10 (2022): 1408. http://dx.doi.org/10.3390/e24101408.
Full textSorial, George A., Karen M. Koran, Edith Holder, Albert D. Venosa, and Dennis W. King. "Development of a Rational Oil Spill Dispersant Effectiveness Protocol." International Oil Spill Conference Proceedings 2001, no. 1 (2001): 471–78. http://dx.doi.org/10.7901/2169-3358-2001-1-471.
Full textWang, Lu, and Wu Song Wen. "Design of RFID Reader Based on Protocol of ISO/IEC 14443 TYPE A." Applied Mechanics and Materials 268-270 (December 2012): 1855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.268-270.1855.
Full textBudiman, M. A., D. Rachmawati, and R. A. Badegeil. "The implementation of RC4+ and Variably Modified Permutation Composition algorithms in the three-pass protocol scheme for data security." Journal of Physics: Conference Series 1235 (June 2019): 012085. http://dx.doi.org/10.1088/1742-6596/1235/1/012085.
Full textKennard, Mark J., Bradley J. Pusey, Bronwyn D. Harch, Elli Dore, and Angela H. Arthington. "Estimating local stream fish assemblage attributes: sampling effort and efficiency at two spatial scales." Marine and Freshwater Research 57, no. 6 (2006): 635. http://dx.doi.org/10.1071/mf06062.
Full textYang, Guomin, Duncan Wong, and Xiaotie Deng. "Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 441–62. https://doi.org/10.3217/jucs-014-03-0441.
Full textBing, Xiong, Tang Yinshan, Jin Ying, and Shen Yingchuan. "Efficacy and safety of a modified method for blind bedside placement of post-pyloric feeding tube: a prospective preliminary clinical trial." Journal of International Medical Research 49, no. 2 (2021): 030006052199218. http://dx.doi.org/10.1177/0300060521992183.
Full textGreencorn, David J., Daniel I. Aponte, and David J. Pearsall. "Photogrammetry: An accurate and cost-effective three-dimensional ice hockey helmet fit acquisition method." Proceedings of the Institution of Mechanical Engineers, Part P: Journal of Sports Engineering and Technology 232, no. 4 (2018): 334–41. http://dx.doi.org/10.1177/1754337118768322.
Full textPtak, T., J. T. Rhea, and R. A. Novelline. "Experience with a continuous, single-pass whole-body multidetector CT protocol for trauma: the three-minute multiple trauma CT scan." Emergency Radiology 8, no. 5 (2001): 250–56. http://dx.doi.org/10.1007/pl00011915.
Full textNuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textLeite, C. R., J. F. Fonseca, D. A. M. Fernandes, J. M. G. Souza-Fabjan, F. O. Ascoli, and F. Z. Brandão. "Cervical relaxation for non-surgical uterus access in Santa Inês ewes." Arquivo Brasileiro de Medicina Veterinária e Zootecnia 70, no. 6 (2018): 1671–79. http://dx.doi.org/10.1590/1678-4162-9622.
Full textRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textLang, Jun. "A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform." Optics Express 20, no. 3 (2012): 2386. http://dx.doi.org/10.1364/oe.20.002386.
Full textK. B., Riyas Basheer, Dinesh K. V., Subhashchandra Rai, and Mohammed Arshak A. T. "Effects of neuromuscular electrical stimulation and core muscle strengthening on trunk instability following stroke." International Journal of Research in Medical Sciences 9, no. 12 (2021): 3596. http://dx.doi.org/10.18203/2320-6012.ijrms20214706.
Full textSalman, Saba, Yasmin Makki Mohialden, Abbas Abdulhameed, and Nadia Mahmood Hussien. "A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented in Banking Systems." Iraqi Journal For Computer Science and Mathematics 5, no. 1 (2024): 277–84. http://dx.doi.org/10.52866/ijcsm.2024.05.01.019.
Full textBodas, Charles, Daryl Williams, Irene Ng, Benjamin Kave, Megan Roberts, and Fiona Begg. "85 Elastic-band beard cover for P2/N95 respirators in healthcare workers: an evaluation." Annals of Work Exposures and Health 68, Supplement_1 (2024): 1. http://dx.doi.org/10.1093/annweh/wxae035.035.
Full textRäisänen, Mikko P., Teemu Karjalainen, Harry Göransson, et al. "DupuytrEn Treatment EffeCtiveness Trial (DETECT): a protocol for prospective, randomised, controlled, outcome assessor-blinded, three-armed parallel 1:1:1, multicentre trial comparing the effectiveness and cost of collagenase clostridium histolyticum, percutaneous needle fasciotomy and limited fasciectomy as short-term and long-term treatment strategies in Dupuytren’s contracture." BMJ Open 8, no. 3 (2018): e019054. http://dx.doi.org/10.1136/bmjopen-2017-019054.
Full text