Results 111 to 120 of about 1,929,820 (318)
Modeling and Analysis of Advanced Cryptographic Primitives and Security Protocols in Maude-NPA [PDF]
Damián Aparicio Sánchez
openalex +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos +2 more
doaj
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Cryptographic security of quantum key distribution [PDF]
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
The Network State, Exit, and the Political Economy of Venture Capital
Abstract This article focuses on the Network State movement as embodying the venture capital (VC) logic of exit. Exit constitutes both a strategy for lucrative returns and an ideology seeking out new territories for financial and technological speculation.
Olivier Jutel
wiley +1 more source
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84 [PDF]
Larissa V. Cherckesova +3 more
openalex +1 more source
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source

