Results 121 to 130 of about 65,031 (278)
On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos +2 more
doaj
Extending cryptographic logics of belief to key agreement protocols [PDF]
Paul C. van Oorschot
openalex +1 more source
A Generic Security Proof for Quantum Key Distribution
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias +2 more
core
Cryptographic security of quantum key distribution [PDF]
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Secure Composition of Cryptographic Protocols [PDF]
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire +3 more sources
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
The Network State, Exit, and the Political Economy of Venture Capital
Abstract This article focuses on the Network State movement as embodying the venture capital (VC) logic of exit. Exit constitutes both a strategy for lucrative returns and an ideology seeking out new territories for financial and technological speculation.
Olivier Jutel
wiley +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban +6 more
wiley +1 more source

