Xxxx and X Sample Clauses

Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.
AutoNDA by SimpleDocs
Xxxx and X. X. Xxxxx. 1997. The range, distribution, and habitat of Sceloporus arenicolus in New Mexico. Final report to New Mexico Department of Game and Fish. Contract #80-516.6-01. 31 pp. Xxxxxxxx, X.X. 1995. Wild animals and settlers on the Great Plains. Univ. of Oklahoma Press, Norman. 316 pp. Xxxxx, X.X. 2002. Landscape features associated with greater prairie-chicken lek locations in Kansas. M. S. Thesis, Emporia State University, Emporia, Kansas. Fuhlendorf, S.D., A.J.W. Xxxxxxxx, X.X. Xxxxxx Xx., and X.X. Xxxxxxxxx. 2002. Multi-scale effects of habitat loss and fragmentation on lesser prairie-chicken populations of the US Southern Great Plains. Lands. Ecol. 17:617-628. Xxxxxx, X.X. 1994a. Movements and nesting habitat of lesser prairie-chicken hens in Colorado. Southwestern Nat. Vol. 39.
Xxxx and X. Xxxxxx, Transaction Processing: Concepts and Techniques, Xxxxxx- Xxxxxxxx, August 1992.
Xxxx and X. X. Xxxx. Modeling insider attacks on group key-exchange protocols. In X. Xxxxxx, X. Xxxxxxx, and X. Xxxxx, editors, ACM CCS 05, pages 180 189. ACM Press, Nov. 2005.
Xxxx and X. X. Tsai, “A manet based emergency communication and information sys- tem for catastrophic natural disasters,” in Proc. of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS’09),Montreal, Quebec, Canada. IEEE, June 2009, pp. 412–417. [8] X. Xxxxxx and X. Xxxxxx, “Public safety and emergency case communications: Opportunities from the aspect of cognitive radio,” in Proc. of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN’08),Chicago, Illinois, USA. IEEE, October 2008, pp. 1–10. [9] X. X. Xxx, X. Xxx, and X. X. Xxx, “Distributed collaborative key agreement and authentication protocols for dynamic peer groups,” IEEE/ACM Transactions on Networking, vol. 14, no. 2, pp. 263–276, April 2006. [10] X. Xxx, X. Xxxxxx, and X. Xxxxxx, “Simple and fault-tolerant key agreement for dynamic collaborative groups,” in Proc. of the 7th ACM conference on Computer and communications security (CCS’00), Athens, Greece. ACM, November 2000, pp. 235–244. [11] X. Xxxxxxxxxx and X. Xxxx, “Ternary tree based group key agreement for cognitive radio manets,” Interna- tional Journal of Computer Network and Information Security (IJCNIS), vol. 6, no. 10, pp. 24–31, September 2014. [12] X. Xxxxxxx, X. Xxxxxx, and X. Xxxxxxx, “Xxxxxx-xxxxxxx key distribution extended to group communication,” in Proc. of the 3rd ACM conference on Computer and communications security (CCS’96), New Delhi, India. ACM, March 1996, pp. 31–37. [13] X. Xxxx and X. Xxx, “Efficient group diffie–xxxxxxx key agreement protocols,” Computers & Electrical En- gineering, vol. 40, no. 6, pp. 1972–1980, August 2014. [14] X. Xxxxx, X. X. Xxx, and X. Xxxxxxx, “An efficient ecc-based privacy-preserving client authentication pro- tocol with key agreement using smart card,” Journal of Information Security and Applications, vol. 21, pp. 1–19, April 2015. [15] H.-X. Xxx, B.-Z. He, C.-X. Xxxx, X.-X. Wu, C.-X. Xxx, and X. Xxxx, “A provable authenticated group key agreement protocol for mobile environment,” Information Sciences, vol. 321, pp. 224–237, November 2015. [16] X. Xxxx, X. Xx, X. Xxx, X. Xxxxx, X. Xxxx, and X. Xxxx, “Provably secure group key management approach based upon hyper-sphere,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 12, pp. 3253– 3263, January 2014. [17] X.-X. Jung, X.-X. Lee, and X.-X. Chung, “The effective group key agreement protocol for ad-hoc networks for medical emergency environments,” in Proc. of the 2006 SI...
Xxxx and X. Mathuria. Proto ols for Authenti ation and Key Establishment. Springer-Verlag, 2003. [BN03℄ X. Xxxx and J.M.G. Nieto. Round-optimal ontributory onferen e key agree- ment. In Publi Key Cryptography '03, pages 161 174. LNCS 2567, 2003. [BW98℄ K. Be ker and X. Xxxxx. Communi ation omplexity of group key distribution. In Pro eedings of 5th ACM Conferen e on Computer and Communi ations Se- urity, pages 1 6. ACM Press, 1998.
Xxxx and X. Xxxx. S alable proto ols for authenti ated group key ex hange - full version. In Advan es in Cryptology - CRYPTO '03, pages 110 125. LNCS 2729, 2003.
AutoNDA by SimpleDocs
Xxxx and X. Xxxxxx. Protocol failures related to order of encryption and signature: Computation of discrete logarithms in RSA groups, April 1997. (Draft).
Xxxx and X. Xxxxxxxx, \Distributed Computer Systems: Four Case Studies," Proc. of the IEEE, Vol. 75, No. 5, May 1987.
Xxxx and X. X. Xxx have proposed the frequency hopping approach to process multiple-frequency microwave measurement data. By using the image reconstructed from low frequency data as the initial guess to the higher frequency problem, the authors found that the non-linear effect can be mitigated. By slowly hopping from lower frequencies to higher frequencies, reconstruction of objects that are as large as 10 wavelengths in diameter with high fidelity can be performed. The image reconstructed is much better than using the high-frequency data directly. Such a MWI algorithm needs no a priori information about the inhomogeneous body [123].
Time is Money Join Law Insider Premium to draft better contracts faster.