Results 101 to 110 of about 1,801,560 (284)
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
Secure Composition of Cryptographic Protocols [PDF]
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire +3 more sources
Corporate Governance in a Crypto‐World
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley +1 more source
How to Govern the Confidence Machine?
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi+2 more
wiley +1 more source
Multi-language oriented automatic realization method for cryptographic protocols
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI+3 more
doaj +2 more sources
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics [PDF]
Shouhuai Xu, Gendu Zhang, Hong Zhu
openalex +1 more source
The medium is the message: The geographies of cryptocurrency remittances to Venezuela
Short Abstract Cryptocurrency remittances overcome many regulatory and practical barriers, but there is little empirical research into this increasingly popular remittance medium. In response, this article explores cryptocurrency remittances from Latin America and the Caribbean into Venezuela.
Daniel Robins
wiley +1 more source
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat+3 more
wiley +1 more source
Self‐Assembled Physical Unclonable Function Labels Based on Plasmonic Coupling
This article introduces advanced anti‐counterfeit labels crafted through DNA‐guided self‐assembly of plasmonic nanoparticles. Utilizing nanosphere lithography for dense and precise nanoparticle placement, these labels feature unique, unclonable optical signatures achieved through plasmonic coupling, detectable by an economical 3D‐printed dark field ...
Mihir Dass+9 more
wiley +1 more source