Post-quantum-inspired scalable blockchain architecture for internet hospital systems with lightweight privacy-preserving access control. [PDF]
Hao L +5 more
europepmc +1 more source
Privacy-preserving AUC computation in distributed machine learning with PHT-meDIC. [PDF]
de Arruda Botelho M +4 more
europepmc +1 more source
The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks [PDF]
Karl Svozil
openalex
Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis. [PDF]
Lastre JK, Ko Y, Kwon H, You I.
europepmc +1 more source
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
Santiago Escobar +2 more
semanticscholar +1 more source
ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]
Al-Mekhlafi ZG +9 more
europepmc +1 more source
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
K. Bhargavan +4 more
semanticscholar +1 more source
SelectVote Byzantine Fault Tolerance for Evidence Custody: Virtual Voting Consensus with Environmental Compensation. [PDF]
Onyeashie BI +3 more
europepmc +1 more source
Novel Cryptographic Protocol to Secure the Weak Edge Nodes in Internet of Things
Vikram Neerugatti, Rama Mohan Reddy
openalex +1 more source

