Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • deletion cost for secure multicast key management 2008-07-31 Paper Optimal Tree Structures for Group Key Management with Batch Updates 2008-05-22 Paper...
    10 bytes (18 words) - 15:10, 12 December 2023
  • optimal trees for group key management with batch updates 2009-03-20 Paper Optimizing deletion cost for secure multicast key management 2008-07-31 Paper Approximately...
    10 bytes (16 words) - 13:25, 6 October 2023
  • Publication Date of Publication Type Secure key management policies in strand spaces 2022-07-13 Paper Gathering of robots in a grid with mobile faults...
    10 bytes (19 words) - 09:56, 8 December 2023
  • Publication Date of Publication Type A generic security API for symmetric key management on cryptographic devices 2014-10-20 Paper https://portal.mardi4nfdi...
    10 bytes (16 words) - 04:11, 25 September 2023
  • Communications 2022-03-23 Paper Faster Key Compression for Isogeny-Based Cryptosystems 2019-08-13 Paper Faster isogeny-based compressed key agreement 2018-06-22 Paper...
    10 bytes (20 words) - 11:09, 12 December 2023
  • Parametric Prediction from Parametric Agents 2020-10-05 Paper Primary key management in distributed log-structured database systems 2019-06-21 Paper Autonomous...
    10 bytes (16 words) - 13:28, 7 October 2023
  • stock market 2022-06-24 Paper An integer programming formulation of the key management problem in wireless sensor networks 2020-06-24 Paper A DC programming...
    10 bytes (17 words) - 20:13, 13 December 2023
  • model based on fuzzy granules 2015-06-24 Paper Efficient and dynamic key management for multiple identities in identity-based systems 2014-08-01 Paper https://portal...
    10 bytes (17 words) - 06:09, 12 December 2023
  • Maliciously Secure Two-Party Computation Using the GPU 2014-10-14 Paper Secure Key Management in the Cloud 2014-01-17 Paper MiniLEGO: Efficient Secure Two-Party Computation...
    10 bytes (18 words) - 05:02, 9 December 2023
  • Partially-Commutative Context-Free Processes 2009-10-22 Paper Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data 2009-10-22 Paper The decidability border...
    10 bytes (17 words) - 05:56, 12 December 2023
  • calculation for the Gelfand-Dey and Chib methods 2012-07-13 Paper Efficient key management scheme based on CPK for mobile Ad Hoc networks 2009-11-22 Paper https://portal...
    10 bytes (17 words) - 12:34, 28 January 2024
  • for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling 2010-04-24 Paper Sorted index numbers...
    10 bytes (16 words) - 07:44, 13 December 2023
  • Publication Date of Publication Type Primary key management in distributed log-structured database systems 2019-06-21 Paper Application of the consistency...
    10 bytes (16 words) - 01:32, 9 December 2023
  • Publication Date of Publication Type Secure path key establishment schemes based on random key management for WSN 2021-12-06 Paper...
    10 bytes (16 words) - 22:49, 24 September 2023
  • de/entity/Q4929336 2010-09-22 Paper Minimizing center key storage in hybrid one-way function based group key management with communication constraints 2009-08-27 Paper...
    10 bytes (16 words) - 17:25, 6 October 2023
  • Optimal tree structures for group key tree management considering insertion and deletion cost 2009-07-10 Paper Optimal Key Tree Structure for Deleting Two...
    10 bytes (17 words) - 14:15, 11 December 2023
  • Publication Type A DC programming approach for solving a centralized group key management problem 2022-10-31 Paper...
    10 bytes (20 words) - 13:55, 6 October 2023
  • Publication Type Publicly Verifiable Secret Sharing for Cloud-Based Key Management 2011-12-16 Paper...
    10 bytes (16 words) - 13:54, 6 October 2023
  • Publication Date of Publication Type Type-Based Analysis of PKCS#11 Key Management 2012-06-29 Paper...
    10 bytes (17 words) - 13:01, 6 October 2023
  • Publication Date of Publication Type Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis 2006-09-12 Paper...
    10 bytes (16 words) - 09:00, 25 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)