Cryptographic nonce

Results: 122



#Item
61Computing / Bitcoin / Peer-to-peer computing / Cryptographic hash functions / Error detection and correction / Proof-of-work system / Cryptographic nonce / Stakeholder / Transmission Control Protocol / Cryptography / Software / Hashing

Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov∗ Charles Lee Alex Mizrahi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-11 22:53:58
62Group signature / David Chaum / Cryptographic nonce / Anonymity / Blind signature / Cryptography / Financial cryptography / Public-key cryptography

Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000. NRL Release Number[removed]Authentic Attr

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:50:54
63Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
64Business / Finance / Mobile payments / Mobile banking / Mobile content / Branchless banking / Cryptographic nonce / Bank / WIZZIT / Technology / Payment systems / Electronic commerce

Secure Branchless Banking Ashlesh Sharma [removed] Lakshminarayanan Subramanian

Add to Reading List

Source URL: dritte.org

Language: English - Date: 2014-07-17 20:38:47
65Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
66Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
67World Wide Web / Cryptographic protocols / Internet protocols / Web services / Digest access authentication / Basic access authentication / Web Application Description Language / Cryptographic nonce / Representational state transfer / Computing / HTTP / Internet

REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS WEB SERVICES API REFERENCE GUIDE

Add to Reading List

Source URL: mchelp.manuscriptcentral.com

Language: English - Date: 2014-02-06 11:01:08
68Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information

Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

Add to Reading List

Source URL: bib.irb.hr

Language: English - Date: 2014-08-21 13:21:17
69Theory of computation / Models of computation / PSPACE-complete / Non-deterministic Turing machine / Cryptographic nonce / Configuration / Theoretical computer science / Turing machine / Applied mathematics

Bounded memory Dolev-Yao adversaries in collaborative systems Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , and Andre Scedrov3 1 Queen Mary, University of London, UK

Add to Reading List

Source URL: bib.irb.hr

Language: English - Date: 2010-09-30 13:57:08
70Computer science / Petri net / Computational complexity theory / Cryptographic nonce / Multiset / P / NL / Complexity classes / Applied mathematics / Mathematics

ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 3, No.9 , May 2014 ISSN : [removed]www.ACSIJ.org Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , and Andre Scedrov4 1 University

Add to Reading List

Source URL: bib.irb.hr

Language: English - Date: 2014-08-21 13:13:52
UPDATE