Secure software development: leveraging application call graphs to detect security vulnerabilities. [PDF]
Yan L, Zhao G, Li X, Sun P.
europepmc +1 more source
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]
Abdelaal MA+5 more
europepmc +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N+9 more
europepmc +1 more source
ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System. [PDF]
Reddy AVSK, Banda G.
europepmc +1 more source
Towards an information-theoretically safe cryptographic protocol
Pedro Fortuny Ayuso
openalex +2 more sources
Cognitive intelligence routing protocol for disaster management and underwater communication system in underwater acoustic network. [PDF]
Saleem K+6 more
europepmc +1 more source
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer
Santiago Escobar+2 more
openalex +1 more source
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones. [PDF]
Algarni AD, Innab N, Algarni F.
europepmc +1 more source
Abstractions for verification of security properties of cryptographic protocols
Alexandre Boisseau
openalex +1 more source