Results 141 to 150 of about 63,614 (274)
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov+3 more
doaj +1 more source
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source
Client Trustworthiness within Internet-banking Application Using Removable Key Carriers
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj
Algorithms of the protected information exchange in radio channels of a space navigation system
To improve the security of information exchange throw navigation space system radio channels to prevent unauthorized use of the system is proposed to use high accuracy cryptographic methods to protect signal.
S. V. Shtanko, D. A. Lesnyk
doaj
Cryptographic key distribution and authentication protocols for secure group communication
Andrew Hutchison, Kurt Bauknecht
openalex +1 more source
Language, Semantics, and Methods for Cryptographic Protocols
Federico Crazzolara, Glynn Winskel
openalex +2 more sources
Process Algebraic Analysis of Cryptographic Protocols
Michele Boreale+2 more
openalex +1 more source
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks [PDF]
Antonio Acín+2 more
openalex +1 more source
Applications of Term Rewriting to Cryptographic Protocol Analysis (overview of the invited talk)
Jonathan K. Millen
openalex +1 more source