Treffer 1 - 20 von 82.679

1

A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.

Information services Privacy Distributed computing Information sharing Quantum entanglement Anonymity
Fachzeitschrift
Merkliste
2

Dieses Ergebnis kann Gästen nicht angezeigt werden.

3

Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.

Forest surveys Public key cryptography Data integrity Commercial drones Electronic authenticatio... Digital signatures
Fachzeitschrift
Merkliste
4

The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.

Fachzeitschrift
Merkliste
5

Dieses Ergebnis kann Gästen nicht angezeigt werden.

6

Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003

Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10

Konferenz
Merkliste
7

Dieses Ergebnis kann Gästen nicht angezeigt werden.

8

Dieses Ergebnis kann Gästen nicht angezeigt werden.

9

Secure Distributed Computing in a Commercial Environment
Financial cryptography

Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304

Konferenz
Merkliste
11

Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images.
Pandey, D. ; Rawat, U. ; Rathore, N.K. ; et al.
IRBM (1959-0318). Jun2022, Vol. 43 Issue 3, p151-160. 10p.

Diagnostic imaging Image encryption Computer networks Distributed computing Network PC (Computer) Medical protocols
Fachzeitschrift
Merkliste
12

Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops

Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278

Konferenz
Merkliste
15

Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing

Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246

Konferenz
Merkliste
16

Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing

Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132

Konferenz
Merkliste
17

New Innovations in Cryptography and Its Applications
High Performance Architecture and Grid Computing; HPAGC 2011

Sharma, S. ; Mishra, N.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):527-538

Konferenz
Merkliste
18

Biometric Encryption: Combining Fingerprints and Cryptography
High Performance Architecture and Grid Computing; HPAGC 2011

Ahuja, M.S. ; Chabbra, S.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):505-514

Konferenz
Merkliste
19

Elliptic Curve Cryptography: Current Status and Research Challenges
High Performance Architecture and Grid Computing; HPAGC 2011

Kalra, S. ; Sood, S.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):455-460

Konferenz
Merkliste
20

Distributed Steganography Using Five Pixel Pair Differencing and Modulus Function.
Fendi, null ; Wibisurya, Aswin ; Faisal, null
Procedia Computer Science. 2017, Vol. 116, p334-341. 8p.

Cryptography Pixel density measuremen... Pixels Distributed computing Modulus counters
Fachzeitschrift
Merkliste

Filter