Results 31 to 40 of about 1,839,178 (288)
A Social-Network-Based Cryptocurrency Wallet-Management Scheme
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios and ...
Shuangyu He +7 more
doaj +1 more source
Current Status and Future Development of Quantum Cryptographic Protocols
Quantum computing has the capability of parallel computing and is superior to classical computing in solving some specific problems. Once a large-scale quantum computer is developed, the security of classical cryptographic algorithms and protocols, which
Zhang Xue +3 more
doaj +1 more source
Agile and Versatile Quantum Communication: Signatures and Secrets
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter +9 more
doaj +1 more source
A Survey on Consensus Protocols and Attacks on Blockchain Technology
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.
Abhishek Guru +5 more
semanticscholar +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj +1 more source
Multiparty Quantum Cryptographic Protocol
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire +4 more sources
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Exclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID protocols and electronic payment protocols. Although there are numerous applications, due to the inherent complexity of faithful models of XOR, there is only ...
Jannik Dreier +3 more
semanticscholar +1 more source
Distributed Cryptographic Protocols
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire +2 more sources

