Results 171 to 180 of about 1,862,454 (331)
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics [PDF]
Shouhuai Xu, Gendu Zhang, Hong Zhu
openalex +1 more source
This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks.
Pranita Bhide+2 more
wiley +1 more source
A research on cross‐chain and interoperation methods of fusion protocol
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming+4 more
doaj +1 more source
On Classical and Quantum Cryptography [PDF]
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]
Devang Naik+4 more
openalex +1 more source
A Quantum Cryptographic Protocol with Detection of Compromised Server [PDF]
This paper presents a hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate.
arxiv
Multi-language oriented automatic realization method for cryptographic protocols
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI+3 more
doaj +2 more sources
Ejafa_protocol: A custom INC secure protocol [PDF]
"EJAFA_PROTOCOL: A CUSTOM INC SECURE PROTOCOL" presents a cryptographic solution tailored for lightweight devices, striking a delicate balance between security and efficiency. The protocol incorporates modern cryptographic primitives, including X25519 for key exchange and ChaCha20 for encryption, while adhering to established RFC standards.
arxiv
ECKOchain: A FAIR blockchain‐based database for long‐term ecological data
Abstract Open data practices in ecology are increasingly accepted, yet primary long‐term ecological data remain hard to find. Barriers preventing open long‐term ecological data include social and economic constructs such as a sense of data proprietorship and fear of misuse of complex datasets. To incentivise open primary ecological data and ensure long‐
Kjell‐Erik Marstein+2 more
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source