Results 181 to 190 of about 1,862,454 (331)
Russian Cryptographic Algorithms in the Identity Management Systems
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj
Creating a blockchain platform: An empirical analysis in the Italian banking sector
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley +1 more source
Process Algebraic Analysis of Cryptographic Protocols [PDF]
Michele Boreale+2 more
openalex +1 more source
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
Corporate Governance in a Crypto‐World
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley +1 more source
A Generic Security Proof for Quantum Key Distribution
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias+2 more
core
How to Govern the Confidence Machine?
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi+2 more
wiley +1 more source
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov+3 more
doaj +1 more source
Client Trustworthiness within Internet-banking Application Using Removable Key Carriers
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source