Results 51 to 60 of about 65,060 (255)

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yes, 2015
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core   +2 more sources

Programming Cryptographic Protocols [PDF]

open access: yes, 2005
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
Joshua D. Guttman   +3 more
openaire   +1 more source

Deterministic hBN Bubbles as a Versatile Platform for Studies on Single‐Photon Emitters

open access: yesAdvanced Functional Materials, EarlyView.
Single‐photon emitters (SPEs) in hBN are promising for quantum technologies; however, in exfoliated samples their activation is required, limiting reproducibility of previous studies. This work introduces a large‐area MOVPE‐grown hBN platform that hosts SPEs without prior activation.
Piotr Tatarczak   +8 more
wiley   +1 more source

Comment on "Quantum identification schemes with entanglements"

open access: yes, 2003
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms.
van Dam, Wim
core   +1 more source

Verification of Stateful Cryptographic Protocols with Exclusive OR [PDF]

open access: yes, 2019
International audienceIn cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic ...
Dreier, Jannik   +3 more
core   +5 more sources

Liquid‐in‐Liquid Prints: High‐Density Biochemically Encoded Information Preserved in Microdroplet Arrays

open access: yesAdvanced Materials, EarlyView.
This work introduces a novel approach for encoding and storing information in the liquid state in microdroplet arrays. These liquid‐in‐liquid prints are generated by a droplet printing system capable of dynamically setting the composition of each droplet pixel.
Maximilian Breitfeld   +5 more
wiley   +1 more source

Emergent Behavior in Cybersecurity [PDF]

open access: yes, 2014
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core   +1 more source

Cryptographic mechanisms for secure interaction of control and measuring devices

open access: yesБезопасность информационных технологий, 2020
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko   +1 more
doaj   +1 more source

Sequential rationality in cryptographic protocols [PDF]

open access: yesACM Transactions on Economics and Computation, 2010
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Gradwohl, Ronen   +2 more
openaire   +2 more sources

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, EarlyView.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy