Treffer 1 - 20
von 82.679
A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.
Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.
Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003
Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10
Secure Distributed Computing in a Commercial Environment
Financial cryptography
Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304
A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography
Advances in Parallel, Distributed Computing; Advances in Parallel, Distributed Computing: Technologies and Applications, PDCTA 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, proceedings
Mahesh, P.K. ; Gudigar, A.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (203):357-365
Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images.
Pandey, D. ; Rawat, U. ; Rathore, N.K. ; et al.
IRBM (1959-0318). Jun2022, Vol. 43 Issue 3, p151-160. 10p.
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops
Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
International Conference on Parallel and Distributed Computing Applications and Technologies; Parallel and distributed computing: applications and technologies : 5th International Conference, PDCAT 2004 Singapore, December 8-10, 2004 proceedings
Setiawan, A. ; Adiutama, D. ; Liman, J. ; et al.
LECTURE NOTES IN COMPUTER SCIENCE. (3320):872-877
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
25th IEEE international conference on distributed computing systems: ICDCS 2005
Chan, A. ; Blake, I.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS. :504-513
Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing
Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246
Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing
Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132
New Innovations in Cryptography and Its Applications
High Performance Architecture and Grid Computing; HPAGC 2011
Sharma, S. ; Mishra, N.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):527-538
Biometric Encryption: Combining Fingerprints and Cryptography
High Performance Architecture and Grid Computing; HPAGC 2011
Ahuja, M.S. ; Chabbra, S.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):505-514
Elliptic Curve Cryptography: Current Status and Research Challenges
High Performance Architecture and Grid Computing; HPAGC 2011
Kalra, S. ; Sood, S.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):455-460
Distributed Steganography Using Five Pixel Pair Differencing and Modulus Function.
Fendi, null ; Wibisurya, Aswin ; Faisal, null
Procedia Computer Science. 2017, Vol. 116, p334-341. 8p.