Results 161 to 170 of about 62,745 (179)
Some of the next articles are maybe not open access.

Cryptographic Protocols

2017
This chapter is concerned with cryptographic protocols. We begin with an explanation of what components a cryptographic protocol consists of. We then illustrate the complexity of designing a secure cryptographic protocol by considering an artificially simple scenario, for which we propose and analyse seven candidate protocols.
openaire   +1 more source

Cryptographic Protocol Analysis of AN.ON

2010
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the freshness of the session key was not checked by the mix. This flaw leads to a situation where an external attacker is able to perform a replay attack against AN.ON. A second, more
Benedikt Westermann   +3 more
openaire   +2 more sources

Compiling and narrowing cryptographic protocols

1999
We propose a direct and fully automated translation from standard authentication protocol descriptions to rewrite rules. This compiling defines a non-ambiguous operational semantics for protocol executions. The rewrite rules are then translated to first-order Horn Logic and processed by the theorem-prover daTac The existence of flaws in the protocol is
Jacquemard, Florent   +2 more
openaire   +1 more source

Scientific procedures and rationales for systematic literature reviews (SPAR‐4‐SLR)

International Journal of Consumer Studies, 2021
Justin Paul, Weng Marc Lim, Aron O'Cass
exaly  

Cryptographic Protocols

2002
Hans Delfs, Helmut Knebl
openaire   +1 more source

General Cryptographic Protocols

2004
The design of secure protocols that implement arbitrarily desired functionalities is a major part of modern cryptography. Taking the opposite perspective, the design of any cryptographic scheme may be viewed as the design of a secure protocol for implementing a suitable functionality. Still, we believe that it makes sense to differentiate between basic
openaire   +2 more sources

An overview of precision oncology basket and umbrella trials for clinicians

Ca-A Cancer Journal for Clinicians, 2020
Kristian Thorlund, Edward J Mills
exaly  

Cryptographic protocols for auctions and bargaining

1994
Modern mathematical cryptography provides many protocols for designing social and economic institutions. This article deals with cryptographic protocols for auctions, bargaining and arbitration. The main contribution of the protocols is in the elimination of specific types of behaviour which otherwise might undermine the desirable properties of the ...
openaire   +2 more sources

Critical operation factors and proposed testing protocol of nanofiltration membranes for developing advanced membrane materials

Advanced Composites and Hybrid Materials, 2021
Xi Quan Cheng, Cher Hon Lau, Lu Shao
exaly  

Home - About - Disclaimer - Privacy