Results 41 to 50 of about 1,901,421 (313)
Anonymous credit cards and their collusion analysis [PDF]
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H. +2 more
core +3 more sources
Programming Cryptographic Protocols [PDF]
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
John D. Ramsdell +3 more
openaire +2 more sources
An IND-CCA2 Secure Public Key Cryptographic Protocol using Suzuki 2-Group
Objectives: The public key cryptographic protocol is one of the most important fields in computer security. These new public key cryptographic protocols provide high security as compare to past results in the same field.
A. Meshram, C. Meshram, N. Khobragade
semanticscholar +1 more source
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj +1 more source
Monitoring approach for online security of cryptographic protocol
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU +5 more
doaj +2 more sources
Secure quantum channels with correlated twin laser beams
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures.
A. Ekert +10 more
core +1 more source
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source
Formal verification for a PMQTT protocol
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam +3 more
doaj +1 more source
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert +16 more
core +1 more source
Multipartite maximally entangled states in symmetric scenarios [PDF]
We consider the class of (N+1)-partite states suitable for protocols where there is a powerful party, the authority, and the other N parties play the same role, namely the state of their system live in the symmetric Hilbert space.
Guillén, Carlos E. González
core +3 more sources

