State of the art in big data applications in microgrid: A review

K Moharm - Advanced Engineering Informatics, 2019 - Elsevier
The prospering Big data era is emerging in the power grid. Multiple world-wide studies are
emphasizing the big data applications in the microgrid due to the huge amount of produced …

Password-based group key exchange in a constant number of rounds

M Abdalla, E Bresson, O Chevassut… - Public Key Cryptography …, 2006 - Springer
With the development of grids, distributed applications are spread across multiple computing
resources and require efficient security mechanisms among the processes. Although …

Interpreting XML documents via an RDF schema ontology

M Klein - … . 13th International Workshop on Database and Expert …, 2002 - ieeexplore.ieee.org
Many business documents are represented in XML. However XML only describes the
structure of data, not its meaning. The meaning of data is required for advanced automated …

A scalable password-based group key exchange protocol in the standard model

M Abdalla, D Pointcheval - … 2006: 12th International Conference on the …, 2006 - Springer
This paper presents a secure constant-round password-based group key exchange protocol
in the common reference string model. Our protocol is based on the group key exchange …

Dynamic asymmetric group key agreement for ad hoc networks

X Zhao, F Zhang, H Tian - Ad Hoc Networks, 2011 - Elsevier
A group key agreement protocol allows a set of users to establish a common symmetric key
via open networks. Dynamic asymmetric group key agreement means that a dynamic set of …

Overview of key agreement protocols

R Dutta, R Barua - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Overview of Key Agreement Protocols 1 Introduction Page 1 Overview of Key Agreement
Protocols Ratna Dutta and Rana Barua Stat-Math Unit Indian Statistical Institute 203, BT Road …

A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps

CT Li, TY Wu, CM Chen - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid growth in the popularity of mobile devices and development of network
technologies, various online social networking applications have grown in popularity. While …

(Password) authenticated key establishment: From 2-party to group

M Abdalla, JM Bohli, MIG Vasco… - Theory of Cryptography …, 2007 - Springer
A protocol compiler is described, that transforms any provably secure authenticated 2-party
key establishment into a provably secure authenticated group key establishment with 2 more …

[PDF][PDF] An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol.

RS Ranjani, DL Bhaskari, PS Avadhani - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
Abstract Lei et al.[26] proposed a new asymmetric group key agreement protocol allowing a
set of users to negotiate a common encryption key accessible by any user, and each user …

Password-authenticated group key exchange: A cross-layer design

Y Zhang, Y Xiang, X Huang - ACM Transactions on Internet Technology …, 2016 - dl.acm.org
Two-party password-authenticated key exchange (2PAKE) protocols provide a natural
mechanism for secret key establishment in distributed applications, and they have been …