A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms. [PDF]
Chen Y+5 more
europepmc +1 more source
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
John C. Mitchell+3 more
openalex +1 more source
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm [PDF]
Konstantinos Chalkias+2 more
openalex +1 more source
Privacy-preserving and verifiable spectral graph analysis in the cloud. [PDF]
Song Y.
europepmc +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]
Zhang M+6 more
europepmc +1 more source
Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements. [PDF]
Cowley A+5 more
europepmc +1 more source
Automatic verification of temporal-epistemic properties of cryptographic protocols
Ioana Boureanu, Mika Cohen, A. Lomuscio
semanticscholar +1 more source
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source
Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks
Anthonis Papadimitriou+3 more
semanticscholar +1 more source
Cryptanalysis of efficient controlled semi-quantum secret sharing protocol with entangled state. [PDF]
Li S, Cai XQ, Song SJ, Wei CY, Wang TY.
europepmc +1 more source