Results 151 to 160 of about 1,901,421 (313)

A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 21-22, 25 September 2025.
ABSTRACT Different small or large‐scale enterprises came to the conclusion that moving data to the cloud is more convenient. In recent decades, AWS and Azure have tried their best to provide comparatively affordable and instant solutions. Both cloud platforms are extensive to understand, so it is difficult for users to make the right choice because of ...
Sara Hameed   +4 more
wiley   +1 more source

An efficient cryptographic protocol verifier based on prolog rules

open access: yesProceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001
B. Blanchet
semanticscholar   +1 more source

On the Reachability Problem in Cryptographic Protocols

open access: yes, 2000
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire   +1 more source

Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

open access: yesUNIF, 2013
Serdar Erbatur   +9 more
semanticscholar   +1 more source

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates

open access: yesIACR Cryptology ePrint Archive, 2015
Benjamin Dowling   +3 more
semanticscholar   +1 more source

Process Algebraic Analysis of Cryptographic Protocols

open access: bronze, 2000
Michele Boreale   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy