Results 61 to 70 of about 96,237 (302)

The Practice of Cryptographic Protocol Verification

open access: yesElectronic Notes in Theoretical Computer Science, 2003
We analyze the complexity of verifying security protocols for finite ...
openaire   +5 more sources

Programming Cryptographic Protocols [PDF]

open access: yes, 2005
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
John D. Ramsdell   +3 more
openaire   +2 more sources

Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network

open access: yesnpj Quantum Information, 2022
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang   +14 more
doaj   +1 more source

Anonymous credit cards and their collusion analysis [PDF]

open access: yes, 1996
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H.   +2 more
core   +3 more sources

Cryptographic Protocols [PDF]

open access: yes, 2021
Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'
openaire   +1 more source

Monitoring approach for online security of cryptographic protocol

open access: yesTongxin xuebao, 2016
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU   +5 more
doaj   +2 more sources

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

Are cryptocurrencies homogeneous?

open access: yesEuropean Financial Management, Volume 29, Issue 1, Page 150-195, January 2023., 2023
Abstract This article investigates if cryptocurrencies returns' are similarly affected by a selection of demand‐ and supply‐side determinants. Homogeneity among cryptocurrencies is tested via a least absolute shrinkage and selection operator (LASSO) model where determinants of Bitcoin returns are applied to a sample of 12 cryptocurrencies. The analysis
Elias Bengtsson, Frida Gustafsson
wiley   +1 more source

A survey on the application of blockchain in cryptographic protocols

open access: yesCybersecurity
With the continuous development of network technology, cryptographic protocols are facing diverse and complex security challenges. Blockchain technology, as a solution incorporating decentralization, traceability, programmability, and immutability ...
Xiangyang Luo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy