Results 121 to 130 of about 1,929,820 (318)

A Generic Security Proof for Quantum Key Distribution

open access: yes, 2004
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias   +2 more
core  

Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]

open access: yes, 2007
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core   +2 more sources

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, EarlyView.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

Resource Fairness and Composability of Cryptographic Protocols [PDF]

open access: bronze, 2010
Juan A. Garay   +3 more
openalex   +1 more source

Digital Identity Wallets: A Guide to the EU’s New Identity Model

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra   +5 more
wiley   +1 more source

Verifying privacy by little interaction and no process equivalence [PDF]

open access: yes, 2012
While machine-assisted verification of classical security goals such as confidentiality and authentication is well-established, it is less mature for recent ones. Electronic voting protocols claim properties such as voter privacy.
Bella, Giampaolo   +1 more
core  

Coalition Formation for Sustainable Blockchain Governance: Insights From the Hedera Case

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Sustainable governance is essential for blockchain networks to achieve widespread adoption and deliver long‐term business value. Prior blockchain initiatives indicate that inadequate governance structures often lead to limited adoption or eventual project failure, underscoring the importance of decentralised governance for building resilient ...
Christophe Viguerie, Horst Treiblmaier
wiley   +1 more source

Multi-language oriented automatic realization method for cryptographic protocols

open access: yesTongxin xuebao, 2012
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI   +3 more
doaj   +2 more sources

A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj  

Home - About - Disclaimer - Privacy