Showing 141 - 160 results of 406 for search '"cryptographic protocol"', query time: 1.71s Refine Results
  1. 141
  2. 142
    by Larsson, Erik, Svensson, Carl
    Published 2013
    ...A mix-net is a cryptographic protocol based on public key cryptography which enables untraceable...
    Get full text
    Others
  3. 143
    by Lindström, Per, Pap, Oscar
    Published 2017
    ...The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three...
    Get full text
    Others
  4. 144
    ... by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages...
    Get full text
    Article
  5. 145
    by Josip Bozic, Lina Marsso, Radu Mateescu, Franz Wotawa
    Published 2018-03-01
    ... the starting point of the testing process. In this paper, a widely used cryptographic protocol is specified...
    Get full text
    Article
  6. 146
    ... of meaningfully integrating cryptographic and group-theoretic tools in cryptographic protocol design...
    Get full text
    Article
  7. 147
    by Joglekar, Sachin P.
    Published 2003
    ... system has several unique characteristics, such as the ability to monitor cryptographic protocols...
    Get full text
    Others
  8. 148
    by Joshua Guttman
    Published 2009-11-01
    ...A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas...
    Get full text
    Article
  9. 149
    by Li Xueying, Li Lei, Hu Jianhao, Yang Shenghua
    Published 2018-05-01
    ...The modern cryptographic protocol specifies that only authorized participants can gain access...
    Get full text
    Article
  10. 150
    by Hanane Houmani, Mohamed Mejri
    Published 2012-01-01
    ... to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed...
    Get full text
    Article
  11. 151
    by Rosenberg, Nathanial Owen
    Published 2012
    ... cryptography suite, including the use of NTRU and AES together in a hybrid cryptographic protocol. This thesis...
    Get full text
  12. 152
    by Biçer Osman, Küpçü Alptekin
    Published 2020-10-01
    .... However, we acknowledge the continuing need for a cryptographic protocol that provides global scale...
    Get full text
    Article
  13. 153
  14. 154
    ... an optimal cloning attack or an intercept-resend attack during a quantum cryptographic protocol. Moreover...
    Get full text
    Article
  15. 155
    by Areej M Abduldaim
    Published 2018-03-01
    .... More officially a blind authentication scheme is a cryptographic protocol that comprises of two parties...
    Get full text
    Article
  16. 156
    by Moy, Melanie, 1979-
    Published 2005
    ... the framework they have developed and defines a cryptographic protocol for the transmission of digital checks...
    Get full text
    Others
  17. 157
    ... handshake protocol by using model checker SPIN and cryptographic protocol verifier ProVerif. Our analysis...
    Get full text
    Article
  18. 158
    by Marchenko, P.
    Published 2014
    ... for sensitive data. First, we look into applying privilege reduction to cryptographic protocol implementations...
    Get full text
  19. 159
    ... are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has...
    Get full text
    Article
  20. 160
    by Bogdan Ksiezopolski, Tomasz Zurek, Michail Mokkas
    Published 2014-01-01
    ... the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic...
    Get full text
    Article