Results 241 to 250 of about 66,162 (284)
Some of the next articles are maybe not open access.
Introduction of Cryptographic Protocols
2012Cryptographic protocols are communication protocols which are designed to provide security assurances of various kinds, using cryptographic mechanisms. This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.
Ling Dong, Kefei Chen
openaire +1 more source
Background of Cryptographic Protocols
2012Some background knowledge including preliminary knowledge, cryptographic primitive knowledge, cryptographic protocol knowledge, cryptographic protocol security knowledge, and communication threat model knowledge are briefly introduced.
Ling Dong, Kefei Chen
openaire +1 more source
Fischer's cryptographic protocols
Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003This note is prepared for Michael Fischer's 60th birthday celebration at PODC 2003. In it, I briefly describe some of Michael Fischer's work on distributed cryptographic protocols.
openaire +1 more source
Cryptographic protocols and voting
1994Three protocols related to computer voting are presented. First protocol is an efficient ANDOS protocol which is based on a natural cryptographic assumption. The other two protocols attack a difficult problem in computer voting: buying of votes. We manage to solve this problem but our protocols are impractical in large-scale elections.
Valtteri Niemi, Ari Renvall
openaire +1 more source
Analyzing a Cryptographic Protocol
2017Web services such as email, photo, social networks, internet commerce, and online banking require that entities authenticate themselves. Scrooge McDuck must be sure that he (it?) is communicating with the bank, and not with some bad guy with a look-a-like web page.
openaire +1 more source
FEATURES OF CRYPTOGRAPHIC PROTOCOLS
NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. The cryptographic protocol contains a description of the structures used and a set of rules governing
openaire +1 more source
An overview of precision oncology basket and umbrella trials for clinicians
Ca-A Cancer Journal for Clinicians, 2020Kristian Thorlund, Edward J Mills
exaly

