Suggested Topics within your search.
Suggested Topics within your search.
Batch verification
1
Block-chain
1
Blockchain
1
Computer networking and communications
1
Cryptographic protocols
1
Cryptography
1
Data transfer
1
Decentralised
1
Digital storage
1
Face recognition
1
Face recognition technologies
1
Information management
1
Liveness detection
1
Living bodies
1
Outsourced datum
1
Outsourcing
1
Payment habits
1
Payment methods
1
Payment systems
1
Performance
1
Product code
1
Proof of retrievability
1
Provable data possessions
1
Remote storage
1
SM4 algorithm
1
Security of data
1
Signal detection
1
Smart contract
1
Storage nodes
1
Storage resources
1
-
201by Marson, Giorgia Azzurra“...A secure channel is a cryptographic protocol that adds security to unprotected network connections...”
Published 2017
Get full text
Get full text
Others -
202by Taha, Ahmed“... cryptographic protocol verifier....”
Published 2018
Get full text
Get full text
Others -
203by Ramos, Rubens Viana“... envelope. Then, we apply the method in a simulation of the quantum-cryptographic protocol BB84, in a lossy...”
Published 2000
Get full text
Get full text
Others -
204by Alaggan, Mohammad“... systems. In particular, we introduce a two-party cryptographic protocol that ensures differential privacy...”
Published 2013
Get full text
-
205by Lafitte, Frédéric“...A cryptographic protocol is a structured exchange of messages protected by means of cryptographic...”
Published 2017
Get full text
Doctoral Thesis -
206by Filipiak, Alicia“... into cryptographic protocols which define the exchanges between devices and entities so that such interaction ensure...”
Published 2018
Get full text
-
207by Chen, Hao“... research has been done in the area of applying formal methods to the design of cryptographic protocols...”
Published 2007
Get full text
-
208by Gagnon, François“... in distributed communications, it is common to use cryptographic protocols. However, the informal design...”
Published 2005
Get full text
Dissertation -
209“...Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play...”
Get full text
Article -
210“...Quantum computation represents a threat to many cryptographic protocols in operation today. It has...”
Get full text
Article -
211by Ribeiro, Marcelo Alves“... protocoles cryptographiques. === Certain cryptographic protocols were specifically developed to provide some...”
Published 2011
Get full text
Others -
212
-
213by Ribeiro, Marcelo Alves“.... === Certain cryptographic protocols were specifically developed to provide some security properties in our...”
Published 2011
Get full text
Dissertation -
214by Duclos, Mathilde“... in this direction. More precisely we want significant progress over formal proofs on cryptographic protocols...”
Published 2016
Get full text
-
215by Coleman, Flora Anne“... cryptographic protocols. However, IoT devices are resource-constrained which makes it difficult for them...”
Published 2020
Get full text
Others -
216“... cryptographic protocols. The oblivious transfer is a very useful tool to design cryptographic...”
Get full text
Others -
217“... preference voting and dining cryptographers protocols are analyzed as case studies to show how the proposed...”
Get full text
Article -
218“...Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish...”
Get full text
Article -
219by Harry Shaw“... complex can be used to create hard cryptographic protocols which should not be breakable by common...”
Published 2017-11-01
Get full text
Article -
220“... cryptographic protocols. This paper presents a unified architecture to compute modular addition, subtraction...”
Get full text
Article