Learn More
Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret(More)
The thermally induced de-/rehydrogenation performance of the graphene supported Pt nanoparticles (Pt/G) doped LiBH4 was greatly improved even at very low catalyst content due to a synergetic effect of Pt addition and nanoconfinement in graphene. For the 5 wt% Pt/G doped LiBH4 sample, the onset hydrogen desorption temperature is about 140 °C lower than that(More)
Pyrolyzing Fe- and N-contained precursor together or separately with graphene results in codoped graphene dominated by bonded or separated Fe and N configuration, respectively. While the FeN bonded case greatly enhances activity toward oxygen reduction, the separated one does not. This rationally designed Fe and N codoped 3D graphene exhibits superior(More)
Core-shell nanostructured hollow carbon nanospheres@nickel cobalt double hydroxides (HCNs@NiCo-LDH) were fabricated using a facile hydrothermal method and investigated as high-performance electrode materials for supercapacitors. HCNs were acquired by a successive polymerization, carbonization and etching process, which was subsequently wrapped by ultrathin(More)
The previous conference schemes for mobile communications focus on establishment, distributing and updating of shared key for conferees, which cannot prevent conferees from submitting fraud message or invalid message. The improvement scheme based on verifiable random number which is constructed with interpolating polynomial reduces the probability of(More)
Based on Diffie-Hellman key exchange protocol, an improved remote authentication protocol for value-added services in mobile networks is proposed, with the help of smart card and client account index. The improved scheme which inherits client anonymity and non-repudiation from previous identity-based remote authentication schemes is more efficient without(More)
  • 1