default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,249 matches
- 2025
- Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora:
A post-quantum key exchange protocol from the intersection of conics. J. Symb. Comput. 126: 102343 (2025) - 2024
- Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch:
BRAKE: Biometric Resilient Authenticated Key Exchange. IEEE Access 12: 46596-46615 (2024) - Jae Yeol Jeong, Hyung Woo Kang, Ik Rae Jeong:
Concurrent Two-Party Key Exchange With Forward Unlinkability in Internet of Drones. IEEE Access 12: 77250-77256 (2024) - Szilárd Pfeiffer, Norbert Tihanyi:
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie-Hellman Key Exchange. IEEE Access 12: 957-980 (2024) - Amang Sudarsono, Rahardhita Widyatra Sudibyo, Idris Winarno, Mike Yuliana:
Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data. IEEE Access 12: 120961-120978 (2024) - Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. IEEE Access 12: 1672-1687 (2024) - Arindam Sarkar:
Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things. Appl. Soft Comput. 161: 111731 (2024) - Komal Pursharthi, Dheerendra Mishra:
A computationally efficient and randomized RLWE-based key exchange scheme. Clust. Comput. 27(2): 1599-1610 (2024) - Zuowen Tan, Jintao Jiao, Yanliang Chen:
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT. Concurr. Comput. Pract. Exp. 36(8) (2024) - Maksymilian Gorski, Wojciech Wodo:
Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE. Cryptogr. 8(2): 14 (2024) - Zeshuo Zhu, Rui Zhang, Yang Tao:
Atomic cross-chain swap based on private key exchange. Cybersecur. 7(1): 12 (2024) - Zhe Wang, Aladine Chetouani, Mohamed Jarraya, Didier Hans, Rachid Jennane:
Transformer with Selective Shuffled Position Embedding and key-patch exchange strategy for early detection of Knee Osteoarthritis. Expert Syst. Appl. 255: 124614 (2024) - Hema Shekhawat, Daya Sagar Gupta:
Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid. Trans. Emerg. Telecommun. Technol. 35(7) (2024) - Weijie Li, Mengjie Huang, Xianhui Lu:
Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping. IEEE Commun. Lett. 28(3): 478-482 (2024) - Maroti Deshmukh, Arjun Singh Rawat:
Secure key exchange protocol using graph and trusted third party. Int. J. Commun. Networks Distributed Syst. 30(4): 393-412 (2024) - Dheerendra Mishra, Purva Rewal, Komal Pursharthi:
Efficient and quantum-secure authenticated key exchange scheme for mobile satellite communication networks. Int. J. Satell. Commun. Netw. 42(4): 313-328 (2024) - Ibrahim A. Elshaer, Alaa M. S. Azazz, Hala A. S. Elsaadany, Ahmed K. Elnagar:
Social CRM Strategies: A Key Driver of Strategic Information Exchange Capabilities and Relationship Quality. Inf. 15(6): 329 (2024) - Tasneem Alshamaseen, Saud Althunibat, Marwa K. Qaraqe, Elmehdi Illi, Muhammad Usman:
Index-Modulation-Based Key Exchange Scheme for Internet of Things Networks. IEEE Internet Things J. 11(2): 2606-2617 (2024) - Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali:
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol. Iran J. Comput. Sci. 7(2): 325-335 (2024) - Vivek Dabra, Saru Kumari, Anju Bala, Sonam Yadav:
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world. J. Inf. Secur. Appl. 84: 103826 (2024) - Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Untraceable blockchain-assisted authentication and key exchange in medical consortiums. J. Syst. Archit. 151: 103143 (2024) - Lin Chen, Tongzhou Qu, Anqi Yin:
Quantum-safe multi-server password-based authenticated key exchange protocol. Multim. Tools Appl. 83(24): 65011-65038 (2024) - Kübra Seyhan, Sedat Akleylek:
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key. PeerJ Comput. Sci. 10: e1791 (2024) - Kübra Seyhan, Sedat Akleylek, Ahmet Faruk Dursun:
Password authenticated key exchange-based on Kyber for mobile devices. PeerJ Comput. Sci. 10: e1960 (2024) - Hema Shekhawat, Daya Sagar Gupta:
Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure. Pervasive Mob. Comput. 100: 101919 (2024) - Chaonan Wang, Hongfeng Zhu:
A hybrid dynamic n-party quantum key exchange protocol based on three-particle GHZ states. Quantum Inf. Process. 23(3): 64 (2024) - Daya Sagar Gupta:
PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments. IEEE Syst. J. 18(1): 15-23 (2024) - R. Vaishali, S. Manohar Naik:
A DNA Cryptosystem Using Diffie-Hellman Key Exchange. SN Comput. Sci. 5(3): 274 (2024) - Hosakota Vamshi Krishna, Krovi Raja Sekhar:
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard. Soft Comput. 28(3): 2671-2681 (2024) - Arindam Sarkar, Krishna Daripa, Mohammad Zubair Khan, Abdulfattah Noorwali:
An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput. 28(5): 4413-4433 (2024)
skipping 2,219 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 10:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint