Results 291 to 300 of about 26,946 (315)
Some of the next articles are maybe not open access.

Secure Untrusted Binaries — Provably!

2006
Most of the previous comparisons of formal analyses of security protocols have concentrated on the tabulation of attacks found or missed. More recent investigations suggest that such cursory comparisons can be misleading. The original context of a protocol as well as the operating assumptions of the analyst have to be taken into account before ...
Manuel M. T. Chakravarty, Simon Winwood
openaire   +2 more sources

Cryptography and the Methodology of Provable Security

2003
Public key cryptography was proposed in the 1976 seminal article of Diffie and Hellman [6]. One year later, Rivest, Shamir and Adleman introduced the RSA cryptosystem as a first example. From an epistemological perspective, one can say that Diffie and Hellman have drawn the most extreme consequence of a principle stated by Auguste Kerckhoffs in the ...
openaire   +2 more sources

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Cryptanalysis vs. Provable Security

2012
In 2004, Koblitz and Menezes started [2] a series of papers questioning the methodology and impact of provable security. We take another look, by comparing cryptanalysis results and provable security results on a variety of topics. We argue that security is complex, and that there is much to gain from better interaction between cryptanalysis and ...
openaire   +2 more sources

Circularly polarized lanthanide luminescence for advanced security inks

Nature Reviews Chemistry, 2020
Lewis Edward MacKenzie, Robert Pal
exaly  

Nano-enabled pesticides for sustainable agriculture and global food security

Nature Nanotechnology, 2022
Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly  

A Survey on Security Aspects for 3GPP 5G Networks

IEEE Communications Surveys and Tutorials, 2020
Jin Cao, Hui Li, Ruhui
exaly  

Home - About - Disclaimer - Privacy