Results 181 to 190 of about 1,862,454 (331)

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

Creating a blockchain platform: An empirical analysis in the Italian banking sector

open access: yesCreativity and Innovation Management, EarlyView.
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley   +1 more source

Process Algebraic Analysis of Cryptographic Protocols [PDF]

open access: bronze, 2000
Michele Boreale   +2 more
openalex   +1 more source

Corporate Governance in a Crypto‐World

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley   +1 more source

A Generic Security Proof for Quantum Key Distribution

open access: yes, 2004
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias   +2 more
core  

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

A Systematic Literature Review of Current Trends in Electronic Voting System Protection Using Modern Cryptography

open access: yesApplied Sciences
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov   +3 more
doaj   +1 more source

Client Trustworthiness within Internet-banking Application Using Removable Key Carriers

open access: yesБезопасность информационных технологий, 2013
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj  

Home - About - Disclaimer - Privacy