Search

Your search keyword '"Cryptographic protocol"' showing total 10,403 results

Search Constraints

Start Over You searched for: Descriptor "Cryptographic protocol" Remove constraint Descriptor: "Cryptographic protocol"
10,403 results on '"Cryptographic protocol"'

Search Results

1. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

3. Security Verification of Instant Messaging Cryptographic Protocols

4. An Elliptic Curve-Based Privacy-Preserving Recommender System

6. Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version.

7. High-Throughput Secure Three-Party Computation with an Honest Majority.

8. Revisiting the ECM-KEEM protocol with Vedic multiplier for enhanced speed on FPGA platforms.

9. Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications.

10. Privacy-preserving geo-tagged image search in edge–cloud computing for IoT.

11. A Novel Group Key Management Protocol Based on Secure Key Calculation Code

12. Symmetric Information Exchange System Based on Ring Isomorphism.

13. Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

14. Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications

15. Towards Blockchain-Based E-Voting Systems

16. Networks Key Distribution Protocols Using KPS

17. Trusted Cryptographic Tools Locking

18. An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness

19. DogFish: Decentralized Optimistic Game-theoretic FIle SHaring

20. Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

21. Enforcing Intelligent Learning-Based Security in Internet of Everything

22. A Dictionary Sequence Model to Analyze the Security of Protocol Implementations at the Source Code Level

24. Modeling and Simulation Strategies of Cryptographic Protocols Based on Finite State Machine

25. Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

27. ПРОТОКОЛ АГРЕГОВАНОГО ПIДПИСУ З ЛIДЕРОМ ГРУПП.

28. Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

29. Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic.

30. SEAL: Sealed-Bid Auction Without Auctioneers.

31. Privacy of Stateful RFID Systems With Constant Tag Identifiers.

32. Hybrid Approach to Speed-Up the Privacy Preserving Kernel K-means Clustering and its Application in Social Distributed Environment.

33. SEMBA: secure multi‐biometric authentication.

35. Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications

36. Composing Protocols with Randomized Actions

37. Improved OR-Composition of Sigma-Protocols

38. Cross-Tool Semantics for Protocol Security Goals

39. MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment

40. A New Approach to Constructing Decentralized Identifier for Secure and Flexible Key Rotation

42. Type 2 Structure-Preserving Signature Schemes Revisited

43. Cryptographic Reverse Firewalls

44. Type-Based Verification of Electronic Voting Protocols

45. Automatically Checking Commitment Protocols in ProVerif without False Attacks

46. (De-)Constructing TLS 1.3

47. Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories

48. Static Evidences for Attack Reconstruction

49. Alice and Bob Meet Equational Theories

50. Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later

Catalog

Books, media, physical & digital resources