Results 211 to 220 of about 65,060 (255)
Some of the next articles are maybe not open access.
Introduction of Cryptographic Protocols
2012Cryptographic protocols are communication protocols which are designed to provide security assurances of various kinds, using cryptographic mechanisms. This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.
Ling Dong, Kefei Chen
openaire +1 more source
Roles in cryptographic protocols
Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 2003In protocols for the distribution of symmetric keys, a principal will usually either take on the role as a session key provider or as a session key user. A principal taking on the role as session key user may also act as the master or the slave.
openaire +1 more source
Abstracting cryptographic protocols
2016Cryptographic protocols can be used to harden the security of IT systems, but only if these protocols are carefully woven into the system. Thus, a security analysis of the overall system is necessary to ensure that the cryptographic protocols are effectively applied. The classical proof technique for computational security proofs (reduction proofs) are,
openaire +1 more source
Background of Cryptographic Protocols
2012Some background knowledge including preliminary knowledge, cryptographic primitive knowledge, cryptographic protocol knowledge, cryptographic protocol security knowledge, and communication threat model knowledge are briefly introduced.
Ling Dong, Kefei Chen
openaire +1 more source
Evaluating Cryptographic Protocols
1993Cryptographic Protocol (CP) analysis is a topic of intense research. Meadows describes four approaches for CP verification under investigation in [MEA92] and several authors have categorized protocols based on types of errors they are subject to [BIRD92], [SYV93a],[SYV93b].
openaire +1 more source
Cryptographic protocols and voting
1994Three protocols related to computer voting are presented. First protocol is an efficient ANDOS protocol which is based on a natural cryptographic assumption. The other two protocols attack a difficult problem in computer voting: buying of votes. We manage to solve this problem but our protocols are impractical in large-scale elections.
Valtteri Niemi, Ari Renvall
openaire +1 more source
An overview of precision oncology basket and umbrella trials for clinicians
Ca-A Cancer Journal for Clinicians, 2020Kristian Thorlund, Edward J Mills
exaly

