•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 58

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Cryptanalysis of an Attribute-based Key Agreement Protocol 

    Type: Conference Paper
    Author : Ziba, Eslami; Nasrollah, Pakniat; Mahnaz, Noroozi
    Request PDF

    A Note on Group Authentication Schemes 

    Type: Journal Paper
    Author : Mohsen Pourpouneh; رسول رمضانیان; Afshin Zarei; Rasoul Ramezanian
    Year: 2016
    Abstract:

    In literature, there are many different forms of group authentication in conference key establishment protocols. The agents participating in a group need to authenticate each other in order to become assure that every ...

    A lightweight key management protocol for secure communication in smart grids 

    Type: Journal Paper
    Author : mostafa farhadi; Morteza Nikooghadam; امیرحسین مهاجرزاده; Behzad Movali; mostafa farhadi; Morteza Nikooghadam; Amirhossein Mohajerzadeh; Behzad Movali
    Year: 2020
    Abstract:

    latency in Generic Object-Oriented Substation Event (GOOSE) and Sample Values (SV) protocols. This paper proposes a secure communication protocol based on hash and private key to overcome the security weaknesses while facilitating the key agreement...

    A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems 

    Type: Conference Paper
    Author : هاله امین طوسی; مهدی نیکوقدم; Haleh Amintoosi; mahdi nikooghadam
    Year: 2019
    Abstract:

    on Internet, they are faced with different security and privacy threats. So, an important challenge is the establishment of a secure key agreement and authentication procedure between the medical servers and patients. Recently, an ECC-based authentication...

    Using Security Patterns for Modelling Security Capabilities in Grid Systems 

    Type: Conference Paper
    Author : Aziz, B. , Blackwell, C.
    Publisher: IEEE
    Year: 2014

    A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids 

    یک طرح مدیریت کلید بر اساس ECC برای ایمن سازی ارتباطات پست های فشار قوی و مرکز کنترل در شبکه های هوشمند

    Author : mostafa Farhadi Moghadam; امیر حسین مهاجرزاده; Amirhossein Mohajerzadeh; Behzad Molavi; بهزاد مولوی
    Publisher: Ferdowsi University of Mashhad Pressانتشارات دانشگاه فردوسی مشهد
    Year: 1397
    Abstract:

    از زمان معرفی برق به خانه ها، شبکه های برق جهانی در خط مقدم پیشرفت های تکنولوژیکی بوده اند. زیرساخت های قدیم سیستم برق که برق را برای خانه ها، کارخانه ها و کسب و کارهای شهر تامین می کنند با سیستم توزیع برق جدید جایگزین می ...

    A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity 

    Type: Journal Paper
    Author : حامد ارشد; عباس رسول زادگان; Hamed Arshad; Abbas Rasoolzadegan
    Year: 2017
    Abstract:

    to breach the security and privacy of data and mobile users. Hence, an authentication and key agreement scheme can be employed to provide secure roaming services. It is well known that the conventional authentication schemes are not suitable for global...

    Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems 

    Type: Journal Paper
    Author : حامد ارشد; عباس رسول زادگان; Hamed Arshad; Abbas Rasoolzadegan
    Year: 2016
    Abstract:

    Authentication and key agreement schemes play a very important role in enhancing

    the level of security of telecare medicine information systems (TMISs). Recently, Amin

    and Biswas demonstrated that the authentication scheme proposed...

    On multiterminal source coding with list decoding constraints 

    Type: Conference Paper
    Author : Yeow-Khiang Chia
    Publisher: IEEE
    Year: 2014

    Business Forms Classification Using Earth Mover's Distance 

    Type: Conference Paper
    Author : Bukhari, S.S. , Ebbecke, M. , Gillmann, M.
    Publisher: IEEE
    Year: 2014
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 6

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    ... View More
    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace