Amanote Research

Amanote Research

    RegisterSign In

One Implementation of a Protocol for Generation and Distribution of Cryptographic Keys

doi 10.15308/sinteza-2018-9-16
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2018

Authors
Dalibor Marijančević,Saša AdamovićMilan Milosavljević
Publisher

Singidunum University


Related search

A Systemic View of One-Pass Cryptographic Key Distribution Techniques for WSNs

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

The Generation of Shared Cryptographic Keys Through Channel Impulse Response Estimation at 60 GHz.

2010English

Recommendation for Cryptographic Key Generation

2019English

What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis

2003English

Implementation of Interrupt Keys

1971English

Providing Higher Entropy Cryptographic Keys by the Use of Biometrics

2010English

Design and Implementation of Robust Embedded Processor for Cryptographic Applications

2010English

CRUST: Cryptographic Remote Untrusted Storage Without Public Keys

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy