Suggested Topics within your search.
Suggested Topics within your search.
Batch verification
1
Block-chain
1
Blockchain
1
Computer networking and communications
1
Cryptographic protocols
1
Cryptography
1
Data transfer
1
Decentralised
1
Digital storage
1
Face recognition
1
Face recognition technologies
1
Information management
1
Liveness detection
1
Living bodies
1
Outsourced datum
1
Outsourcing
1
Payment habits
1
Payment methods
1
Payment systems
1
Performance
1
Product code
1
Proof of retrievability
1
Provable data possessions
1
Remote storage
1
SM4 algorithm
1
Security of data
1
Signal detection
1
Smart contract
1
Storage nodes
1
Storage resources
1
-
141
-
142“...A mix-net is a cryptographic protocol based on public key cryptography which enables untraceable...”
Get full text
Others -
143“...The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three...”
Get full text
Others -
144“... by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages...”
Get full text
Article -
145“... the starting point of the testing process. In this paper, a widely used cryptographic protocol is specified...”
Get full text
Article -
146“... of meaningfully integrating cryptographic and group-theoretic tools in cryptographic protocol design...”
Get full text
Article -
147by Joglekar, Sachin P.“... system has several unique characteristics, such as the ability to monitor cryptographic protocols...”
Published 2003
Get full text
Others -
148by Joshua Guttman“...A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas...”
Published 2009-11-01
Get full text
Article -
149“...The modern cryptographic protocol specifies that only authorized participants can gain access...”
Get full text
Article -
150“... to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed...”
Get full text
Article -
151by Rosenberg, Nathanial Owen“... cryptography suite, including the use of NTRU and AES together in a hybrid cryptographic protocol. This thesis...”
Published 2012
Get full text
-
152“.... However, we acknowledge the continuing need for a cryptographic protocol that provides global scale...”
Get full text
Article -
153by Farhi, Edward, Gosset, David Nicholas, Hassidim, Avinatan, Lutomirski, Andrew Michael, Shor, Peter W.Get fulltext
Published 2011
Article -
154by Frédéric Bouchard, Felix Hufnagel, Dominik Koutný, Aazad Abbas, Alicia Sit, Khabat Heshami, Robert Fickler, Ebrahim Karimi“... an optimal cloning attack or an intercept-resend attack during a quantum cryptographic protocol. Moreover...”
Published 2019-05-01
Get full text
Article -
155by Areej M Abduldaim“.... More officially a blind authentication scheme is a cryptographic protocol that comprises of two parties...”
Published 2018-03-01
Get full text
Article -
156by Moy, Melanie, 1979-“... the framework they have developed and defines a cryptographic protocol for the transmission of digital checks...”
Published 2005
Get full text
Others -
157“... handshake protocol by using model checker SPIN and cryptographic protocol verifier ProVerif. Our analysis...”
Get full text
Article -
158by Marchenko, P.“... for sensitive data. First, we look into applying privilege reduction to cryptographic protocol implementations...”
Published 2014
Get full text
-
159by Nikolaos Petrakos, Stefanos Monachos, Emmanouil Magkos, Panayiotis Kotzanikolaou“... are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has...”
Published 2020-09-01
Get full text
Article -
160“... the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic...”
Get full text
Article