Results 51 to 60 of about 1,929,820 (318)

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications

open access: yesIEEE Access, 2017
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won, Seung-Hyun Seo, E. Bertino
semanticscholar   +1 more source

Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]

open access: yes, 2011
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent   +2 more
core   +2 more sources

CAPSL and MuCAPSL

open access: yesJournal of Telecommunications and Information Technology, 2002
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj   +1 more source

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

Nonmonotonic cryptographic protocols [PDF]

open access: yesProceedings The Computer Security Foundations Workshop VII, 2002
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
A.D. Rubin, P. Honeyman
openaire   +1 more source

Model checking quantum Markov chains [PDF]

open access: yes, 2012
Although the security of quantum cryptography is provable based on the principles of quantum mechanics, it can be compromised by the flaws in the design of quantum protocols and the noise in their physical implementations.
Feng, Yuan, Ying, Mingsheng, Yu, Nengkun
core   +1 more source

Guiding a general-purpose C verifier to prove cryptographic protocols [PDF]

open access: yesIEEE Computer Security Foundations Symposium, 2011
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography.
François Dupressoir   +3 more
semanticscholar   +1 more source

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication

open access: yes, 2006
We investigate the error tolerance of quantum cryptographic protocols using $d$-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical ...
A. Acín   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy