Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State of the art in big data applications in microgrid: A review
K Moharm - Advanced Engineering Informatics, 2019 - Elsevier
The prospering Big data era is emerging in the power grid. Multiple world-wide studies are
emphasizing the big data applications in the microgrid due to the huge amount of produced …
emphasizing the big data applications in the microgrid due to the huge amount of produced …
Password-based group key exchange in a constant number of rounds
M Abdalla, E Bresson, O Chevassut… - … Workshop on Public Key …, 2006 - Springer
With the development of grids, distributed applications are spread across multiple computing
resources and require efficient security mechanisms among the processes. Although …
resources and require efficient security mechanisms among the processes. Although …
Interpreting XML documents via an RDF schema ontology
M Klein - … . 13th International Workshop on Database and Expert …, 2002 - ieeexplore.ieee.org
Many business documents are represented in XML. However XML only describes the
structure of data, not its meaning. The meaning of data is required for advanced automated …
structure of data, not its meaning. The meaning of data is required for advanced automated …
A scalable password-based group key exchange protocol in the standard model
This paper presents a secure constant-round password-based group key exchange protocol
in the common reference string model. Our protocol is based on the group key exchange …
in the common reference string model. Our protocol is based on the group key exchange …
Dynamic asymmetric group key agreement for ad hoc networks
A group key agreement protocol allows a set of users to establish a common symmetric key
via open networks. Dynamic asymmetric group key agreement means that a dynamic set of …
via open networks. Dynamic asymmetric group key agreement means that a dynamic set of …
[HTML][HTML] A memetic algorithm to solve the dynamic multiple runway aircraft landing problem
The aircraft landing problem (ALP) consists of scheduling the landing of aircrafts onto the
available runways in an airport by assigning to each aircraft a landing time and a specific …
available runways in an airport by assigning to each aircraft a landing time and a specific …
Overview of key agreement protocols
R Dutta, R Barua - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Overview of Key Agreement Protocols 1 Introduction Page 1 Overview of Key Agreement
Protocols Ratna Dutta and Rana Barua Stat-Math Unit Indian Statistical Institute 203, BT Road …
Protocols Ratna Dutta and Rana Barua Stat-Math Unit Indian Statistical Institute 203, BT Road …
A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps
With the rapid growth in the popularity of mobile devices and development of network
technologies, various online social networking applications have grown in popularity. While …
technologies, various online social networking applications have grown in popularity. While …
(Password) authenticated key establishment: From 2-party to group
A protocol compiler is described, that transforms any provably secure authenticated 2-party
key establishment into a provably secure authenticated group key establishment with 2 more …
key establishment into a provably secure authenticated group key establishment with 2 more …
[PDF][PDF] An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol.
Abstract Lei et al.[26] proposed a new asymmetric group key agreement protocol allowing a
set of users to negotiate a common encryption key accessible by any user, and each user …
set of users to negotiate a common encryption key accessible by any user, and each user …