Guest editor’s introduction: Special issue on Modelling and Verification of Cryptographic Protocols
Roberto M. Amadio
openalex +1 more source
A byzantine-resistant blockchain framework for secure and scalable immigration management. [PDF]
Shafin KM, Reno S.
europepmc +1 more source
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm [PDF]
Konstantinos Chalkias +2 more
openalex +1 more source
Continuous Authentication in Resource-Constrained Devices via Biometric and Environmental Fusion. [PDF]
Zeeshan N +3 more
europepmc +1 more source
A Practical Attack on a Braid Group Based Cryptographic Protocol
Alexei Myasnikov +2 more
openalex +1 more source
A hybrid multi-node QKD-ECC architecture for securing IoT networks. [PDF]
Chaturvedi R +7 more
europepmc +1 more source
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
John C. Mitchell +3 more
openalex +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source
Cryptographic Protocol Explication and End-Point Projection
J. McCarthy, S. Krishnamurthi
semanticscholar +1 more source
HERMEES: A Holistic Evaluation and Ranking Model for Energy-Efficient Systems Applied to Selecting Optimal Lightweight Cryptographic and Topology Construction Protocols in Wireless Sensor Networks. [PDF]
Prvulovic P +3 more
europepmc +1 more source

