Results 51 to 60 of about 1,929,820 (318)
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won, Seung-Hyun Seo, E. Bertino
semanticscholar +1 more source
Trace Equivalence Decision: Negative Tests and Non-determinism [PDF]
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
Cheval, Vincent +2 more
core +2 more sources
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad +5 more
doaj +1 more source
Nonmonotonic cryptographic protocols [PDF]
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information.
A.D. Rubin, P. Honeyman
openaire +1 more source
Model checking quantum Markov chains [PDF]
Although the security of quantum cryptography is provable based on the principles of quantum mechanics, it can be compromised by the flaws in the design of quantum protocols and the noise in their physical implementations.
Feng, Yuan, Ying, Mingsheng, Yu, Nengkun
core +1 more source
Guiding a general-purpose C verifier to prove cryptographic protocols [PDF]
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography.
François Dupressoir +3 more
semanticscholar +1 more source
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham +4 more
core +1 more source
Special Issue on Algorithms for Cryptographic Protocols
n ...
Andreas Vogt
doaj +1 more source
We investigate the error tolerance of quantum cryptographic protocols using $d$-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical ...
A. Acín +8 more
core +1 more source

