Results 151 to 160 of about 4,817 (211)

Verifying Cryptographic Protocols

open access: yesVerifying Cryptographic Protocols
openaire  
Some of the next articles are maybe not open access.

Related searches:

Cryptographic protocols

Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy