Results 241 to 250 of about 66,162 (284)
Some of the next articles are maybe not open access.

Introduction of Cryptographic Protocols

2012
Cryptographic protocols are communication protocols which are designed to provide security assurances of various kinds, using cryptographic mechanisms. This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.
Ling Dong, Kefei Chen
openaire   +1 more source

Background of Cryptographic Protocols

2012
Some background knowledge including preliminary knowledge, cryptographic primitive knowledge, cryptographic protocol knowledge, cryptographic protocol security knowledge, and communication threat model knowledge are briefly introduced.
Ling Dong, Kefei Chen
openaire   +1 more source

Fischer's cryptographic protocols

Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003
This note is prepared for Michael Fischer's 60th birthday celebration at PODC 2003. In it, I briefly describe some of Michael Fischer's work on distributed cryptographic protocols.
openaire   +1 more source

Cryptographic protocols and voting

1994
Three protocols related to computer voting are presented. First protocol is an efficient ANDOS protocol which is based on a natural cryptographic assumption. The other two protocols attack a difficult problem in computer voting: buying of votes. We manage to solve this problem but our protocols are impractical in large-scale elections.
Valtteri Niemi, Ari Renvall
openaire   +1 more source

Cryptographic Protocols

2002
Hans Delfs, Helmut Knebl
openaire   +2 more sources

Analyzing a Cryptographic Protocol

2017
Web services such as email, photo, social networks, internet commerce, and online banking require that entities authenticate themselves. Scrooge McDuck must be sure that he (it?) is communicating with the bank, and not with some bad guy with a look-a-like web page.
openaire   +1 more source

FEATURES OF CRYPTOGRAPHIC PROTOCOLS

NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. The cryptographic protocol contains a description of the structures used and a set of rules governing
openaire   +1 more source

An overview of precision oncology basket and umbrella trials for clinicians

Ca-A Cancer Journal for Clinicians, 2020
Kristian Thorlund, Edward J Mills
exaly  

Home - About - Disclaimer - Privacy