Results 271 to 280 of about 1,901,421 (313)
Some of the next articles are maybe not open access.
Cryptographic technologies and protocol standards for Internet of Things
Internet of Things, 2019S. Zeadally, A. Das, N. Sklavos
semanticscholar +1 more source
A Cryptographic Analysis of the WireGuard Protocol
IACR Cryptology ePrint Archive, 2018Benjamin Dowling, K. Paterson
semanticscholar +1 more source
General Cryptographic Protocols
2004The design of secure protocols that implement arbitrarily desired functionalities is a major part of modern cryptography. Taking the opposite perspective, the design of any cryptographic scheme may be viewed as the design of a secure protocol for implementing a suitable functionality. Still, we believe that it makes sense to differentiate between basic
openaire +2 more sources
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device
Pairing-Based Cryptography, 2012Sébastien Canard +3 more
semanticscholar +1 more source
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations
Engineering Secure Software and Systems, 2011R. Corin, F. Manzano
semanticscholar +1 more source
An overview of precision oncology basket and umbrella trials for clinicians
Ca-A Cancer Journal for Clinicians, 2020Kristian Thorlund, Edward J Mills
exaly
On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol
EURASIP Journal on Information Security, 2010M. Kuribayashi
semanticscholar +1 more source

