Gotowa bibliografia na temat „Key Fob Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Key Fob Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Key Fob Security"
IJRAME, Journal. "Vehicle unlocking system using Key Fob with Fingerprint." International Journal of Research in Aeronautical and Mechanical Engineering 13, no. 5 (2025): 34–45. https://doi.org/10.5281/zenodo.15496160.
Pełny tekst źródłaIsa, Mohd Anuar Mat, Habibah Hashim, Syed Farid Syed Adnan, Nur Nabila Mohamed, and Yasin Fitri Alias. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688. http://dx.doi.org/10.11591/ijeecs.v11.i2.pp688-695.
Pełny tekst źródłaMohd, Anuar Mat Isa, Hashim Habibah, Farid Syed Adnan Syed, Nabila Mohamed Nur, and Fitri Alias Yasin. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688–95. https://doi.org/10.11591/ijeecs.v11.i2.pp688-695.
Pełny tekst źródłaIbrahim, Dasam Sunday, and Prof Mutiullah Olasupo. "The Nigerian Military Operation Safe Haven (OPSH) Operation in Internal Security Management in Plateau State: Challenges and Prospects." JOURNAL OF POLITICAL SCIENCE AND LEADERSHIP RESEARCH 9, no. 1 (2023): 10–24. http://dx.doi.org/10.56201/jpslr.v9.no1.2023.pg10.24.
Pełny tekst źródłaHeatherly, Raymond. "Privacy and Security within Biobanking: The Role of Information Technology." Journal of Law, Medicine & Ethics 44, no. 1 (2016): 156–60. http://dx.doi.org/10.1177/1073110516644206.
Pełny tekst źródłaM J, Pavithra, Poornima M, and Nirmala Nirmala. "Raspberry Pi-based Facial Recognition for Vehicle Access Control." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40261.
Pełny tekst źródłaPatil, Tushar Anil, and Prof Dr Mrs K. V. Kulhalli. "Symmetric Key Cryptography Algorithm for Data Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 586–89. http://dx.doi.org/10.31142/ijtsrd9444.
Pełny tekst źródłaFengwei Cheng, Fengwei Cheng, Sai Ji Fengwei Cheng, and Chin-Feng Lai Sai Ji. "Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing." 網際網路技術學刊 23, no. 7 (2022): 1461–71. http://dx.doi.org/10.53106/160792642022122307002.
Pełny tekst źródłaHao Yan, Hao Yan, Yanan Liu Hao Yan, Dandan Huang Yanan Liu, Shuo Qiu Dandan Huang, and Zheng Zhang Shuo Qiu. "Public Integrity Verification for Cloud Storage with Efficient Key-update." 網際網路技術學刊 24, no. 6 (2023): 1263–71. http://dx.doi.org/10.53106/160792642023112406009.
Pełny tekst źródłaMelnyk, Viktor. "Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem." Advances in Cyber-Physical Systems 4, no. 1 (2019): 42–54. http://dx.doi.org/10.23939/acps2019.01.042.
Pełny tekst źródłaRozprawy doktorskie na temat "Key Fob Security"
Ng, Wee Hock Desmond. "Group key management for IP multicast security." Thesis, University of Surrey, 2006. http://epubs.surrey.ac.uk/844098/.
Pełny tekst źródłaTian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.
Pełny tekst źródłaKalibjian, Jeffrey R. "Accountable Security Architectures for Protecting Telemetry Data." International Foundation for Telemetering, 2001. http://hdl.handle.net/10150/606436.
Pełny tekst źródłaNg, Eddie M. "Security Models and Proofs for Key Establishment Protocols." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1072.
Pełny tekst źródłaHan, Yong-Fei. "Fast algorithms for public key cryptography." Thesis, Royal Holloway, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244544.
Pełny tekst źródłaTabatabaian, Seyed Jalil. "Cryptanalysis algortihms for public key cryptosystems." Thesis, University of Newcastle Upon Tyne, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.283904.
Pełny tekst źródłaBrzeczko, Albert Walter. "Scalable framework for turn-key honeynet deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/51842.
Pełny tekst źródłaSandor, Alexander. "Security of dynamic authorisation for IoT through Blockchain technology." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231868.
Pełny tekst źródłaAzam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.
Pełny tekst źródłaWang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.
Pełny tekst źródłaKsiążki na temat "Key Fob Security"
National Institute of Standards and Technology (U.S.), ed. Recommendation for pair-wise key establishment schemes using integer factorization cryptography. National Institute of Standards and Technology, 2009.
Znajdź pełny tekst źródłaNational Institute of Standards and Technology (U.S.), ed. Recommendation for pair-wise key establishment schemes: Using integer factorization cryptography. National Institute of Standards and Technology, 2008.
Znajdź pełny tekst źródłaPolk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
Znajdź pełny tekst źródłaPolk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
Znajdź pełny tekst źródłaGalbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Wiley Pub., 2002.
Znajdź pełny tekst źródłaGerd, Nonneman, Ehteshami Anoushiravan, Glosemeyer Iris, European University Institute, and Robert Schuman Centre, eds. Terrorism, Gulf security and Palestine: Key issues for an EU-GCC dialogue. European University Institute, 2002.
Znajdź pełny tekst źródłaKathina, Juma Monica, Velásquez García Rafael, Kesselman Brittany, University for Peace. Africa Programme., and SaferAfrica (Organization), eds. Compendium of key documents relating to peace and security in Africa. Petoria University Law Press, 2006.
Znajdź pełny tekst źródłaOffice, United States Government Accountability. Securing, stabilizing, and reconstructing Afghanistan: Key issues for congressional oversight : report to congressional committees. United States Government Accountability Office, 2007.
Znajdź pełny tekst źródłaDon, Johnson, Smid Miles E, and National Institute of Standards and Technology (U.S.), eds. Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography: (revised). National Institute of Standards and Technology, 2007.
Znajdź pełny tekst źródłaA, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.
Znajdź pełny tekst źródłaCzęści książek na temat "Key Fob Security"
Ngo, Long, Colin Boyd, and Juan González Nieto. "Automating Computational Proofs for Public-Key-Based Key Exchange." In Provable Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16280-0_4.
Pełny tekst źródłaLee, Ruby B. "Public-Key Cryptography." In Security Basics for Computer Architects. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-01742-1_5.
Pełny tekst źródłaDavid, Michael W., and Kouichi Sakurai. "Security issues for contactless smart cards." In Public Key Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0054029.
Pełny tekst źródłaBoyd, Colin, Anish Mathuria, and Douglas Stebila. "Computational Security Models." In Protocols for Authentication and Key Establishment. Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_2.
Pełny tekst źródłaOkamoto, Tatsuaki. "Threshold key-recovery systems for RSA." In Security Protocols. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028169.
Pełny tekst źródłaWang, Jian, Lein Harn, and Hideki Imai. "Key Management for Multicast Fingerprinting." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_14.
Pełny tekst źródłaKrähenbühl, Cyrill, and Adrian Perrig. "Key Management." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_4.
Pełny tekst źródłaYan, Song Y. "Secret-Key Cryptography." In Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72536-9_4.
Pełny tekst źródłaKumar, Vijay, Rakesh Sharma, and Ashwani Kush. "Key Authentication for MANET Security." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_68.
Pełny tekst źródłaBaek, Joonsang, Ron Steinfeld, and Yuliang Zheng. "Formal Proofs for the Security of Signcryption." In Public Key Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45664-3_6.
Pełny tekst źródłaStreszczenia konferencji na temat "Key Fob Security"
MAMATHA, G. S., ADIGA S. ANEESH, and GANESH CHAITHANYA. "Public Key Security for Quantum Key Distribution." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10817048.
Pełny tekst źródłaAshok, Nomula, and T. Judgi. "Advanced Techniques in Dynamic Key Management and Multilayered Security for Securing Cloud Infrastructures Using Key-Aggregate Encryption Method." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823242.
Pełny tekst źródłaVenkatesan, Karthika, Seshadhri Srinivasan, Padmapritha Thamodharan, et al. "Distributed Estimation Based Public Key Infrastructure for In-Vehicle Network Security." In 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2024. http://dx.doi.org/10.1109/pkia62599.2024.10729035.
Pełny tekst źródłaHajomer, Adnan A. E., Ivan D. Derkach, Radim Filip, Ulrik L. Andersen, Vladyslav C. Usenko, and Tobias Gehring. "Continuous-variable quantum passive optical network for multi-user quantum key distribution." In Quantum Technologies for Defence and Security, edited by Giacomo Sorelli, Sara Ducci, and Sylvain Schwartz. SPIE, 2024. http://dx.doi.org/10.1117/12.3034038.
Pełny tekst źródłaPrévost, Thomas, Bruno Martin, and Olivier Alibart. "A Secret Key Spreading Protocol for Extending ETSI Quantum Key Distribution." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013077100003899.
Pełny tekst źródłaJagatheesaperumal, Senthil Kumar, Dhanupriyan Pothiraja, Satheesh Kumaresan, Mohamed Rahouti, Hamza Drid, and Khaled Hamouid. "Authentic key agreement scheme for blockchain-based smart grid applications." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3054791.
Pełny tekst źródłaBerl, Jonas, Mario Wenning, Ciarán Mullan, Helmut Grießer, and Tobias Fehenberger. "Trust-Enhanced Quantum Key Management System for Meshed QKD Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m3z.16.
Pełny tekst źródłaAbdolmaleki, Behzad, Karim Baghery, Bahareh Akhbari, Seyed Mohammad Alavi, and Mohammad Reza Aref. "Securing key exchange and key agreement security schemes for RFID passive tags." In 2016 24th Iranian Conference on Electrical Engineering (ICEE). IEEE, 2016. http://dx.doi.org/10.1109/iraniancee.2016.7585754.
Pełny tekst źródłaMullan, Ciarán. "Threshold Key Storage via Fuzzy Extractors With Applications." In 3rd International Conference on Cryptography and Blockchain. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132102.
Pełny tekst źródłaJin, Xiyou, and Jonathan Sahagun. "Deuterium: A Secure Protocol for Group Messaging with Rotating Keys and Identity Verification." In 11th International Conference on Signal Image Processing and Multimedia. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130908.
Pełny tekst źródłaRaporty organizacyjne na temat "Key Fob Security"
Fluhrer, S., P. Kampanakis, D. McGrew, and V. Smyslov. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8784.
Pełny tekst źródłaBuitrago, Paola, Lucia Dammert, Nicolas Garcette, et al. IDB's Response to Key Challenges in Citizen Security, 1998-2012. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0010575.
Pełny tekst źródłaEronen, P., and H. Tschofenig, eds. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4279.
Pełny tekst źródłaBhatia, M., S. Hartman, and D. Zhang. Security Extension for OSPFv2 When Using Manual Key Management. Edited by A. Lindem. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7474.
Pełny tekst źródłaPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Pełny tekst źródłaPoovendran, Radha, and Brian Matt. Security Analysis and Extensions of the PCB Algorithm for Distributed Key Generation. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada459087.
Pełny tekst źródłaKwan, S., P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3645.
Pełny tekst źródłaBlumenthal, U., and P. Goel. Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4785.
Pełny tekst źródłaArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 7 Key Findings. Food Standards Agency, 2024. http://dx.doi.org/10.46756/sci.fsa.qqj935.
Pełny tekst źródłaArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 6 Key Findings. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.djj797.
Pełny tekst źródła