A symbolic decision procedure for cryptographic protocols with time stamps
Liana Bozga+2 more
openalex +1 more source
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
Multi-partite quantum cryptographic protocols with noisy GHZ states
Kai Chen, Hoi‐Kwong Lo
openalex +2 more sources
Privacy-preserving and verifiable spectral graph analysis in the cloud. [PDF]
Song Y.
europepmc +1 more source
Infinite State AMC-Model Checking for Cryptographic Protocols [PDF]
Detlef Kähler+2 more
openalex +1 more source
Guest editor’s introduction: Special issue on Modelling and Verification of Cryptographic Protocols
Roberto M. Amadio
openalex +1 more source
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning. [PDF]
Hazzazi MM+5 more
europepmc +1 more source
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
John C. Mitchell+3 more
openalex +1 more source
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm [PDF]
Konstantinos Chalkias+2 more
openalex +1 more source