Keyword search (4,163 papers available)

"power" Keyword-tagged Publications:

Title Authors PubMed ID
1 Investigating Workplace Bullying Using a Person-Centered Approach: Capturing Targets Exposure and Sense of Defenselessness Through Latent Profile Analysis Trépanier SG; Notelaers G; Birkeland Nielsen M; Morin AJS; 41902650
CONCORDIA
2 Entrepreneurship as a driver of rural women s empowerment in Iran Rezaei-Moghaddam K; Fatemi M; Ghafouri M; Golkarfard M; 41290906
ENCS
3 Queer occultism, sentimental biopower, and becoming bottoms as a means to divest from white supremacy among practitioners of magic in Montreal Sydney Sheedy 40078317
CONCORDIA
4 Effects of early midlife ovarian removal on sleep: Polysomnography-measured cortical arousal, homeostatic drive, and spindle characteristics Brown A; Gervais NJ; Gravelsins L; O' Byrne J; Calvo N; Ramana S; Shao Z; Bernardini M; Jacobson M; Rajah MN; Einstein G; 39178647
HKAP
5 The effects of competition and implicit power motive on men's testosterone, emotion recognition, and aggression Vongas JG; Al Hajj R; 28455183
JMSB
6 A Multilevel Person-Centered Perspective on the Role of Job Demands and Resources for Employees' Job Engagement and Burnout Profiles Gillet N; Morin AJS; Blais AR; 38698872
CONCORDIA
7 Microstructure of Deposits Sprayed by a High Power Torch with Flash Boiling Atomization of High-Concentration Suspensions Amrollahy Biouki S; Ben Ettouil F; C Liberati A; Dolatabadi A; Moreau C; 38612008
ENCS
8 A longitudinal investigation of structural empowerment profiles among healthcare employees Cougot B; Gillet N; Morin AJS; Gauvin J; Ollierou F; Moret L; Tripodi D; 38093467
CONCORDIA
9 Update on air pollution control strategies for coal-fired power plants Asif Z; Chen Z; Wang H; Zhu Y; 35572480
ENCS
10 Age of Acquisition Modulates Alpha Power During Bilingual Speech Comprehension in Noise Grant AM; Kousaie S; Coulter K; Gilbert AC; Baum SR; Gracco V; Titone D; Klein D; Phillips NA; 35548507
CRDH
11 Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems Ahene E; Ofori-Oduro M; Twum F; Walker J; Missah YM; 34960339
ENCS
12 Feasibility of Pressure-Retarded Osmosis for Electricity Generation at Low Temperatures Abbasi-Garravand E; Mulligan CN; 34436319
ENCS
13 Work Fatigue Profiles: Nature, Implications, and Associations With Psychological Empowerment. Blais AR, Gillet N, Houle SA, Comeau CA, Morin AJS 33329261
CONCORDIA
14 A Benchmark of Data Stream Classification for Human Activity Recognition on Connected Objects. Khannouz M; Glatard T; 33202905
ENCS
15 Differences in MEG and EEG power-law scaling explained by a coupling between spatial coherence and frequency: a simulation study. Bénar CG, Grova C, Jirsa VK, Lina JM 31292816
PERFORM
16 The relationship between exercise intensity, cerebral oxygenation and cognitive performance in young adults. Mekari S, Fraser S, Bosquet L, Bonnéry C, Labelle V, Pouliot P, Lesage F, Bherer L 26063061
PERFORM

 

Title:Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems
Authors:Ahene EOfori-Oduro MTwum FWalker JMissah YM
Link:https://pubmed.ncbi.nlm.nih.gov/34960339/
DOI:10.3390/s21248245
Publication:Sensors (Basel, Switzerland)
Keywords:authentication protocolchaos-based cryptographykey exchangewireless power transfer
PMID:34960339 Category: Date Added:2021-12-28
Dept Affiliation: ENCS
1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, PMB, UPO, KNUST, Kumasi, Ghana.
2 Department of Electrical and Computer Engineering, Concordia University, 1455 De Maisonneuve Blvd, Montreal, QC H3G IM8, Canada.
3 School of Software Engineering, University of Electronic Science and Technology of China, Chengdu 610051, China.

Description:

Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires. In practice, the key to certified charging requires the use of an authentication protocol between a transmitter (charger) and receiver (smartphone/some device). Via the protocol, a safe level and appropriate charging power can be harvested from a charger. Devoid of an efficient authentication protocol, a malicious charger may fry the circuit board of a receiver or cause a permanent damage to the device. In this regard, we first propose a chaos-based key exchange authentication protocol and analyze its robustness in terms of security and computational performance. Secondly, we theoretically demonstrate how the protocol can be applied to WPT systems for the purposes of charger to receiver authentication. Finally, we present insightful research problems that are relevant for future research in this paradigm.





BookR developed by Sriram Narayanan
for the Concordia University School of Health
Copyright © 2011-2026
Cookie settings
Concordia University