Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by D. Eastlake

Secret Key Transaction Authentication for DNS (TSIG)

2000English
  • ‹
  • 1
  • 2

Related publications

Delayed-Key Message Authentication for Streams

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Implementation of Highly Efficient Authentication and Transaction Security

International Journal of Computer Applications
2011English

Authentication and Secret Search Mechanisms for RFID-aware Wireless Sensor Networks

International Journal of Security and Networks
Electronic EngineeringRiskComputer NetworksCommunicationsReliabilityElectricalSafetyQuality
2010English

Secret Distribution of Keys for Public-Key Systems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1988English

Architecture for the Secret-Key Bc3 Cryptography Algorithm

ITB Journal of Information and Communication Technology
2011English

Key Minimal Authentication Systems for Unconditional Secrecy

English

Securing Online Transaction Using Fingerprint Authentication With Embedded Cameras

IOSR Journal of Electronics and Communication Engineering
2016English

Information-Theoretically Secret Key Generation for Fading Wireless Channels

IEEE Transactions on Information Forensics and Security
RiskComputer NetworksCommunicationsReliabilitySafetyQuality
2010English

Physical Layer Secret Key Generation for Fiber-Optical Networks

Optics Express
OpticsAtomicMolecular Physics,
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy