Results 71 to 80 of about 63,614 (274)
Cryptographic protocols in practice [PDF]
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz+4 more
wiley +1 more source
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly+3 more
doaj +1 more source
Statistical Link Between Bell Nonlocality and Uncertainty Relations in Quantum Mechanics
Bell nonlocality and uncertainty principle are two distinguished features in quantum mechanics from classical physics. In this work, it is showed the interplay between these two quantum properties. The upper bound of nonlocal correlation strength is determined by accumulation of all local measurement uncertainty, which means that more Bell nonlocality ...
Li‐Yi Hsu
wiley +1 more source
Cheat Sensitive Quantum Bit Commitment
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent+8 more
core +1 more source
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone+3 more
wiley +1 more source
On the Reachability Problem in Cryptographic Protocols [PDF]
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire +4 more sources
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev+1 more
doaj
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko+1 more
doaj +1 more source