Treffer 1 - 20
von 17.152
- 1
- 2
Seite in der Trefferliste auswählen
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.
Expected Constant Round Byzantine Broadcast under Dishonest Majority.
Wan, Jun ; Xiao, Hanshen ; Shi, Elaine ; et al.
Journal of the ACM. Aug2025, Vol. 72 Issue 4, p1-39. 39p.
A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003
Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10
Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.
Secure Distributed Computing in a Commercial Environment
Financial cryptography
Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Magic Functions.
Dwork, Cynthia ; Naor, Moni ; Reingold, Omer ; et al.
Journal of the ACM. Nov2003, Vol. 50 Issue 6, p852-920. 70p.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Survey on securing wireless networks through a blockchain-based framework.
Singh, Jagdeep ; Dhurandher, Sanjay Kumar ; Kumar, Vinesh ; et al.
Journal of High Speed Networks. 2024, Vol. 30 Issue 4, p657-677. 21p.
A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography
Advances in Parallel, Distributed Computing; Advances in Parallel, Distributed Computing: Technologies and Applications, PDCTA 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, proceedings
Mahesh, P.K. ; Gudigar, A.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (203):357-365
Efficient and secure multiparty summation without semi-honest third-party.
Liu, Zhuo ; Li, Fulin ; Han, Mu ; et al.
Computer Networks. Nov2025, Vol. 272, pN.PAG-N.PAG. 1p.
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
International Conference on Parallel and Distributed Computing Applications and Technologies; Parallel and distributed computing: applications and technologies : 5th International Conference, PDCAT 2004 Singapore, December 8-10, 2004 proceedings
Setiawan, A. ; Adiutama, D. ; Liman, J. ; et al.
LECTURE NOTES IN COMPUTER SCIENCE. (3320):872-877
Securing and managing healthcare data generated by intelligent blockchain systems on cloud networks through DNA cryptography.
Kaur, Harleen ; Jameel, Roshan ; Alam, M. Afshar ; et al.
Journal of Enterprise Information Management. 2023, Vol. 36 Issue 4, p861-878. 18p.
Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing
Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops
Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
25th IEEE international conference on distributed computing systems: ICDCS 2005
Chan, A. ; Blake, I.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS. :504-513
Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing
Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132
- 1
- 2