2017
DOI: 10.15587/1729-4061.2017.98896
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of the simplified communication mechanism in the cloud of high performance computations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…There is a method [12] for monoglycerides obtaining using amidation of linseed oil with diethylenetriamine at temperatures of (413-453) K and different molar ratios of components. The disadvantage of this method is many stages, the need and complexity of mono-and diglycerides separation, the use of diethylenetriamine.…”
Section: °C the Mass Fraction Of Free Glycerol In Monoglycerides Was ...mentioning
confidence: 99%
See 1 more Smart Citation
“…There is a method [12] for monoglycerides obtaining using amidation of linseed oil with diethylenetriamine at temperatures of (413-453) K and different molar ratios of components. The disadvantage of this method is many stages, the need and complexity of mono-and diglycerides separation, the use of diethylenetriamine.…”
Section: °C the Mass Fraction Of Free Glycerol In Monoglycerides Was ...mentioning
confidence: 99%
“…The review of scientific studies [9][10][11][12][13][14][15][16] indicates that the transesterification process is promising in terms of monoglycerides obtaining. However, there is insufficient data on the impact of process parameters on the yield and quality of the product.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…The Kc keys for each user are calculated by the AuC of the home network and transmitted to the VLR as part of a set of triplets, where each triplet and, accordingly, the key Kc, is assigned a key number -CKSN. In some implementations, algorithms A3 and A8 are combined into a single algorithm A38, which uses RAND and Ki to generate Kc and SRES [9]. Unlike A3 and A8, which may be different for each individual operator, A5 is selected from a list of 7 possible options.…”
Section: Fig 2 Authentication Procedures Schemementioning
confidence: 99%
“…If the network and the mobile station do not have common versions of A5, the connection must continue in open mode or the connection will be lost. Algorithm A5 uses a 64-bit key Kc and a 22-bit TDMA frame number to compute the two 114-bit encryption words BLOCK1 and BLOCK2, which are used in transmission and reception, respectively [8]. Encryption words -EXORed with 114 bits of data in each frame.…”
Section: Fig 2 Authentication Procedures Schemementioning
confidence: 99%