Suggested Topics within your search.
Suggested Topics within your search.
Batch verification
1
Block-chain
1
Blockchain
1
Computer networking and communications
1
Cryptographic protocols
1
Cryptography
1
Data transfer
1
Decentralised
1
Digital storage
1
Face recognition
1
Face recognition technologies
1
Information management
1
Liveness detection
1
Living bodies
1
Outsourced datum
1
Outsourcing
1
Payment habits
1
Payment methods
1
Payment systems
1
Performance
1
Product code
1
Proof of retrievability
1
Provable data possessions
1
Remote storage
1
SM4 algorithm
1
Security of data
1
Signal detection
1
Smart contract
1
Storage nodes
1
Storage resources
1
-
1
-
2
-
3by Mahlburg, KarlSubjects: “...Cryptographic Protocols...”
Published 2001
Get full text
Get full text
Others -
4
-
5
-
6
-
7
-
8by Lepinski, Matthew (Matthew Baker), 1978-“... protocols. In particular, we show that that all existing cryptographic protocols allow malicious players...”
Published 2007
Get full text
Others -
9by Patil, Akshay (Akshay R.)“... composable (UC) secure framework to construct computationally sound proofs of cryptographic protocol security...”
Published 2006
Get full text
Others -
10
-
11
-
12by Lee, Ming-Feng“... identity. This thesis formally studies and analyzes cryptographic protocols with anonymity preserving...”
Published 2013
Get full text
-
13by Skaff, Stephanie J. C.“... correct functionality of cryptographic protocol verifiers. As a replacement for manual input of well...”
Published 2012
Get full text
-
14
-
15
-
16
-
17
-
18
-
19
-
20by Saul, Elton“... is effective for creating cryptographic protocols since it encompasses a variety of design, analysis...”
Published 2014
Get full text
Dissertation