Cryptographic protocol

Results: 1374



#Item
1Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross

Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross

Add to Reading List

Source URL: storage.googleapis.com

Language: English - Date: 2018-04-02 02:01:50
    2A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

    A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-01-18 13:44:36
      3Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA  fmillen,

      Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,

      Add to Reading List

      Source URL: jonmillen.com

      Language: English - Date: 2017-01-20 09:49:12
        4Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

        Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

        Add to Reading List

        Source URL: jeapostrophe.github.io

        - Date: 2018-04-03 12:30:31
          5Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

          Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

          Add to Reading List

          Source URL: rich.recoil.org

          Language: English - Date: 2006-04-19 14:01:38
          6Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

          Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

          Add to Reading List

          Source URL: work.debayangupta.com

          Language: English - Date: 2014-06-25 08:00:47
          7Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

          Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

          Add to Reading List

          Source URL: systempay.cyberpluspaiement.com

          Language: English - Date: 2015-12-16 04:48:58
          8Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1

          Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1

          Add to Reading List

          Source URL: womencourage.acm.org

          Language: English - Date: 2016-08-09 09:13:43
          9Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡  Martin J. Straussk

          Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

          Add to Reading List

          Source URL: cs-www.cs.yale.edu

          Language: English - Date: 2006-09-25 10:55:42
          10Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

          Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

          Add to Reading List

          Source URL: www.thorprojects.com

          Language: English - Date: 2015-07-23 13:05:22