Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Cryptographic protocols

BiBT94 Ingrid Biehl, Johannes Buchmann, Christoph Thiel Cryptographic protocols based on discrete logarithms in real-quadratic orders Crypto 94, LNCS 839, Springer-Verlag, BerUn 1994, 56-60. [Pg.372]

Damg88a Ivan Bjerre Damgard The Application of Claw Free Functions in Cryptography -Unconditional Protection in Cryptographic Protocols Aarhus University, Computer Science Department, DAIMIPB - 269 (ISSN 0105-8517), May 1988. [Pg.375]

Mead95 Catherine A. Meadows Formal Verification of Cryptographic Protocols A Survey Asiacrypt 94, LNCS 917, Springer-Verlag, Berlin 1995, 133-150. [Pg.380]

Merr83 Michael John Merritt Cryptographic Protocols Ph. D. Dissertation, School of Information and Computer Science, Georgia Institute of Technology, Feb. 1983. [Pg.381]

Jayaram, K.R. Identifying and Testing for Insecure Paths in Cryptographic Protocol Implementations. In Proc. of the 30th Annual International Computer Software and Applications Conference, Chicago, USA, September 2006, pp. 368-369 (2006)... [Pg.242]

The first quantum cryptographic key distribution protocol was published in 1984 by Bennett and Brassard and is called BB84.An informal description of this method is described below [9]—[10]. [Pg.328]

A CRYPTOGRAPHIC MOBILE AGENT IMPLEMENTING SECURE PERSONAL CONTENT DELIVERY PROTOCOL... [Pg.331]

Viator (Latin messenger, traveler) is a cryptographic mobile agent that implements secure personal content delivery, proposed in this paper. It has been implemented in JADE framework and is a proof-of-concept for the protocol. Currently, JADE-LEAP version of JADE does not support agent mobility on mobile terminals. Hence, Viator was implemented on the Linux platform. It will be ported to mobile device version as soon as support for mobility is available. There were a number of agents implemented ... [Pg.343]

The quantum communication protocols described above may be used to implement quantum counterparts to the classical solutions of cryptographic tasks mentioned in Section VIII.A. Until now most of the efforts were devoted to a quantum solution of the key-distribution problem, which may readily be applied to secure message exchange or can be used as a building block for different cryptographic schemes. [Pg.571]


See other pages where Cryptographic protocols is mentioned: [Pg.240]    [Pg.240]    [Pg.331]    [Pg.332]    [Pg.2777]    [Pg.135]    [Pg.137]    [Pg.3]    [Pg.53]    [Pg.107]    [Pg.74]    [Pg.76]   
See also in sourсe #XX -- [ Pg.137 ]




SEARCH



Cryptographers

© 2024 chempedia.info