Results 141 to 150 of about 96,237 (302)
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
Estimators in Cryptography [PDF]
One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94 ...
arxiv
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics [PDF]
Shouhuai Xu, Gendu Zhang, Hong Zhu
openalex +1 more source
Cryptographic key distribution and authentication protocols for secure group communication [PDF]
Andrew Hutchison, Kurt Bauknecht
openalex +1 more source
ECKOchain: A FAIR blockchain‐based database for long‐term ecological data
Abstract Open data practices in ecology are increasingly accepted, yet primary long‐term ecological data remain hard to find. Barriers preventing open long‐term ecological data include social and economic constructs such as a sense of data proprietorship and fear of misuse of complex datasets. To incentivise open primary ecological data and ensure long‐
Kjell‐Erik Marstein+2 more
wiley +1 more source
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj
On Classical and Quantum Cryptography [PDF]
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv
Security and Composition of Multiparty Cryptographic Protocols [PDF]
Ran Canetti
openalex +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source
A Quantum Cryptographic Protocol with Detection of Compromised Server [PDF]
This paper presents a hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate.
arxiv