Results 141 to 150 of about 96,237 (302)

Estimators in Cryptography [PDF]

open access: yesAnn. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 23-29, 2012
One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94 ...
arxiv  

ECKOchain: A FAIR blockchain‐based database for long‐term ecological data

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract Open data practices in ecology are increasingly accepted, yet primary long‐term ecological data remain hard to find. Barriers preventing open long‐term ecological data include social and economic constructs such as a sense of data proprietorship and fear of misuse of complex datasets. To incentivise open primary ecological data and ensure long‐
Kjell‐Erik Marstein   +2 more
wiley   +1 more source

A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj  

On Classical and Quantum Cryptography [PDF]

open access: yesarXiv, 2001
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv  

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

A Quantum Cryptographic Protocol with Detection of Compromised Server [PDF]

open access: yesarXiv, 2003
This paper presents a hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate.
arxiv  

Home - About - Disclaimer - Privacy