Treffer 1 - 20 von 17.152

1

The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.

Fachzeitschrift
Merkliste
2

Expected Constant Round Byzantine Broadcast under Dishonest Majority.
Wan, Jun ; Xiao, Hanshen ; Shi, Elaine ; et al.
Journal of the ACM. Aug2025, Vol. 72 Issue 4, p1-39. 39p.

Fachzeitschrift
Merkliste
3

A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.

Information services Privacy Distributed computing Information sharing Quantum entanglement Anonymity
Fachzeitschrift
Merkliste
4

Dieses Ergebnis kann Gästen nicht angezeigt werden.

5

Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003

Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10

Konferenz
Merkliste
6

Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.

Forest surveys Public key cryptography Data integrity Commercial drones Electronic authenticatio... Digital signatures
Fachzeitschrift
Merkliste
7

Secure Distributed Computing in a Commercial Environment
Financial cryptography

Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304

Konferenz
Merkliste
8

Dieses Ergebnis kann Gästen nicht angezeigt werden.

9

Dieses Ergebnis kann Gästen nicht angezeigt werden.

10

Magic Functions.
Dwork, Cynthia ; Naor, Moni ; Reingold, Omer ; et al.
Journal of the ACM. Nov2003, Vol. 50 Issue 6, p852-920. 70p.

Fachzeitschrift
Merkliste
11

Dieses Ergebnis kann Gästen nicht angezeigt werden.

12

Survey on securing wireless networks through a blockchain-based framework.
Singh, Jagdeep ; Dhurandher, Sanjay Kumar ; Kumar, Vinesh ; et al.
Journal of High Speed Networks. 2024, Vol. 30 Issue 4, p657-677. 21p.

Fachzeitschrift
Merkliste
14

Efficient and secure multiparty summation without semi-honest third-party.
Liu, Zhuo ; Li, Fulin ; Han, Mu ; et al.
Computer Networks. Nov2025, Vol. 272, pN.PAG-N.PAG. 1p.

Fachzeitschrift
Merkliste
16

Securing and managing healthcare data generated by intelligent blockchain systems on cloud networks through DNA cryptography.
Kaur, Harleen ; Jameel, Roshan ; Alam, M. Afshar ; et al.
Journal of Enterprise Information Management. 2023, Vol. 36 Issue 4, p861-878. 18p.

Fachzeitschrift
Merkliste
17

Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing

Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246

Konferenz
Merkliste
18

Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops

Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278

Konferenz
Merkliste
20

Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing

Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132

Konferenz
Merkliste

Filter