Results 141 to 150 of about 65,031 (278)
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Ran Canetti
openalex +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos +10 more
wiley +1 more source
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov +3 more
doaj +1 more source
Cryptographic key distribution and authentication protocols for secure group communication
Andrew Hutchison, Kurt Bauknecht
openalex +1 more source
Client Trustworthiness within Internet-banking Application Using Removable Key Carriers
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj
On the Reachability Problem in Cryptographic Protocols
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire +1 more source
Algorithms of the protected information exchange in radio channels of a space navigation system
To improve the security of information exchange throw navigation space system radio channels to prevent unauthorized use of the system is proposed to use high accuracy cryptographic methods to protect signal.
S. V. Shtanko, D. A. Lesnyk
doaj

