Results 131 to 140 of about 1,801,560 (284)

Quantum cryptographic three party protocols

open access: green, 2000
Joern Mueller-Quade, Hiroyuki Imai
openalex   +2 more sources

Process Algebraic Analysis of Cryptographic Protocols

open access: bronze, 2000
Michele Boreale   +2 more
openalex   +1 more source

SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC

open access: yesAdvanced Engineering Research, 2012
The idea of analyzing cryptographic key generation protocols through BAN - logic methods is considered. An e xample of Kerberos protocol analysis is given. The software tool that automates the analysis of key g eneration protocols is built.
Nadezhda S. Mogilevskaya
doaj  

On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 1997
D. Boneh, R. DeMillo, R. Lipton
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy