Showing 201 - 220 results of 406 for search '"cryptographic protocol"', query time: 2.42s Refine Results
  1. 201
    by Marson, Giorgia Azzurra
    Published 2017
    ...A secure channel is a cryptographic protocol that adds security to unprotected network connections...
    Get full text
    Get full text
    Others
  2. 202
    by Taha, Ahmed
    Published 2018
    ... cryptographic protocol verifier....
    Get full text
    Get full text
    Others
  3. 203
    by Ramos, Rubens Viana
    Published 2000
    ... envelope. Then, we apply the method in a simulation of the quantum-cryptographic protocol BB84, in a lossy...
    Get full text
    Get full text
    Others
  4. 204
    by Alaggan, Mohammad
    Published 2013
    ... systems. In particular, we introduce a two-party cryptographic protocol that ensures differential privacy...
    Get full text
  5. 205
    by Lafitte, Frédéric
    Published 2017
    ...A cryptographic protocol is a structured exchange of messages protected by means of cryptographic...
    Get full text
    Doctoral Thesis
  6. 206
    by Filipiak, Alicia
    Published 2018
    ... into cryptographic protocols which define the exchanges between devices and entities so that such interaction ensure...
    Get full text
  7. 207
    by Chen, Hao
    Published 2007
    ... research has been done in the area of applying formal methods to the design of cryptographic protocols...
    Get full text
  8. 208
    by Gagnon, François
    Published 2005
    ... in distributed communications, it is common to use cryptographic protocols. However, the informal design...
    Get full text
    Dissertation
  9. 209
    by Yaqi Song, Li Yang
    Published 2018-10-01
    ...Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play...
    Get full text
    Article
  10. 210
    by Joseph J. Kearney, Carlos A. Perez-Delgado
    Published 2021-07-01
    ...Quantum computation represents a threat to many cryptographic protocols in operation today. It has...
    Get full text
    Article
  11. 211
    by Ribeiro, Marcelo Alves
    Published 2011
    ... protocoles cryptographiques. === Certain cryptographic protocols were specifically developed to provide some...
    Get full text
    Others
  12. 212
  13. 213
    by Ribeiro, Marcelo Alves
    Published 2011
    .... === Certain cryptographic protocols were specifically developed to provide some security properties in our...
    Get full text
    Dissertation
  14. 214
    by Duclos, Mathilde
    Published 2016
    ... in this direction. More precisely we want significant progress over formal proofs on cryptographic protocols...
    Get full text
  15. 215
    by Coleman, Flora Anne
    Published 2020
    ... cryptographic protocols. However, IoT devices are resource-constrained which makes it difficult for them...
    Get full text
    Others
  16. 216
    by Yung-Hsiang Chen, 陳永祥
    Published 1994
    ... cryptographic protocols. The oblivious transfer is a very useful tool to design cryptographic...
    Get full text
    Others
  17. 217
    ... preference voting and dining cryptographers protocols are analyzed as case studies to show how the proposed...
    Get full text
    Article
  18. 218
    ...Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish...
    Get full text
    Article
  19. 219
    by Harry Shaw
    Published 2017-11-01
    ... complex can be used to create hard cryptographic protocols which should not be breakable by common...
    Get full text
    Article
  20. 220
    by Khalid Javeed, Xiaojun Wang
    Published 2016-01-01
    ... cryptographic protocols. This paper presents a unified architecture to compute modular addition, subtraction...
    Get full text
    Article