A comparative performance analysis of distributed queue dual bus access control methods

Author(s):  
K.M. Khalil ◽  
M.E. Koblentz
2009 ◽  
Vol 29 (7) ◽  
pp. 2000-2002
Author(s):  
Qin CHEN ◽  
Huan YUAN ◽  
Jian-hua FENG

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


Sign in / Sign up

Export Citation Format

Share Document