-
1
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: “…cryptographic protocol identification…”
Get full text
Article -
2
-
3
A Secure and Scalable Authentication and Communication Protocol for Smart Grids
Published 2025-03-01Subjects: Get full text
Article -
4
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM
Published 2025-04-01Subjects: “…Cryptographic protocol…”
Get full text
Article -
5
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01Subjects: Get full text
Article -
6
Efficient inner product arguments and their applications in range proofs
Published 2023-05-01Subjects: Get full text
Article -
7
Quantum‐resistant anonymous identity‐based encryption with trable identities
Published 2022-03-01Subjects: “…cryptographic protocols…”
Get full text
Article -
8
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
Published 2021-01-01Subjects: “…cryptographic protocols…”
Get full text
Article -
9
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Subjects: Get full text
Article -
10
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
11
Enhancing Security and Efficiency in IoT Assistive Technologies: A Novel Hybrid Systolic Array Multiplier for Cryptographic Algorithms
Published 2025-03-01Subjects: Get full text
Article -
12
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
Published 2012-03-01Subjects: Get full text
Article