Results 41 to 50 of about 1,801,560 (284)

Nanotechnology and cryptographic protocols: issues and possible solutions

open access: yesNanomaterials and Energy, 2019
Nanotechnology has provided an immense increment in computational power. This high computational strength is very dangerous for existing cryptographic protocols, and the Data Encryption Standard al...
Varun Shukla   +2 more
semanticscholar   +1 more source

Realizing a blockchain solution without blockchain? Blockchain, solutionism, and trust

open access: yesRegulation &Governance, EarlyView., 2023
Abstract Blockchain is employed as a technology holding a solutionist promise, while at the same time, it is hard for the promissory blockchain applications to become realized. Not only is the blockchain protocol itself not foolproof, but when we move from “blockchain in general” to “blockchain in particular,” we see that new governance structures and ...
Gert Meyers, Esther Keymolen
wiley   +1 more source

Confidential machine learning on untrusted platforms: a survey

open access: yesCybersecurity, 2021
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or ...
Sharma Sagar, Chen Keke
doaj   +1 more source

Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

open access: yesIEEE Access, 2019
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Quantum and classical oblivious transfer: A comparative analysis

open access: yesIET Quantum Communication, 2021
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos   +2 more
doaj   +1 more source

Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols

open access: yesIEEE Transactions on Information Forensics and Security, 2018
The classical Bloom filter data structure is a crucial component of hundreds of cryptographic protocols. It has been used in privacy preservation and secure computation settings, often in conjunction with the (somewhat) homomorphic properties of ciphers ...
L. Calderoni, P. Palmieri, D. Maio
semanticscholar   +1 more source

CAPSL and MuCAPSL

open access: yesJournal of Telecommunications and Information Technology, 2002
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj   +1 more source

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

Programming Cryptographic Protocols [PDF]

open access: yes, 2005
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
John D. Ramsdell   +3 more
openaire   +2 more sources

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications

open access: yesIEEE Access, 2017
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won, Seung-Hyun Seo, E. Bertino
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy