Results 31 to 40 of about 1,839,178 (288)

A Social-Network-Based Cryptocurrency Wallet-Management Scheme

open access: yesIEEE Access, 2018
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios and ...
Shuangyu He   +7 more
doaj   +1 more source

Current Status and Future Development of Quantum Cryptographic Protocols

open access: yes中国工程科学, 2022
Quantum computing has the capability of parallel computing and is superior to classical computing in solving some specific problems. Once a large-scale quantum computer is developed, the security of classical cryptographic algorithms and protocols, which
Zhang Xue   +3 more
doaj   +1 more source

Agile and Versatile Quantum Communication: Signatures and Secrets

open access: yesPhysical Review X, 2021
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter   +9 more
doaj   +1 more source

A Survey on Consensus Protocols and Attacks on Blockchain Technology

open access: yesApplied Sciences, 2023
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.
Abhishek Guru   +5 more
semanticscholar   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj   +1 more source

Multiparty Quantum Cryptographic Protocol

open access: yesChinese Physics Letters, 2008
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire   +4 more sources

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

open access: yesIEEE Computer Security Foundations Symposium, 2018
Exclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID protocols and electronic payment protocols. Although there are numerous applications, due to the inherent complexity of faithful models of XOR, there is only ...
Jannik Dreier   +3 more
semanticscholar   +1 more source

Distributed Cryptographic Protocols

open access: yes, 2023
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire   +2 more sources

Home - About - Disclaimer - Privacy