Results 291 to 300 of about 26,946 (315)
Some of the next articles are maybe not open access.
Secure Untrusted Binaries — Provably!
2006Most of the previous comparisons of formal analyses of security protocols have concentrated on the tabulation of attacks found or missed. More recent investigations suggest that such cursory comparisons can be misleading. The original context of a protocol as well as the operating assumptions of the analyst have to be taken into account before ...
Manuel M. T. Chakravarty, Simon Winwood
openaire +2 more sources
Cryptography and the Methodology of Provable Security
2003Public key cryptography was proposed in the 1976 seminal article of Diffie and Hellman [6]. One year later, Rivest, Shamir and Adleman introduced the RSA cryptosystem as a first example. From an epistemological perspective, one can say that Diffie and Hellman have drawn the most extreme consequence of a principle stated by Auguste Kerckhoffs in the ...
openaire +2 more sources
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Cryptanalysis vs. Provable Security
2012In 2004, Koblitz and Menezes started [2] a series of papers questioning the methodology and impact of provable security. We take another look, by comparing cryptanalysis results and provable security results on a variety of topics. We argue that security is complex, and that there is much to gain from better interaction between cryptanalysis and ...
openaire +2 more sources
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Hui Li, Ruhui
exaly

