Treffer 1 - 20
von 82.426
- 1
- 2
Seite in der Trefferliste auswählen
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.
A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003
Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10
Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.
Secure Distributed Computing in a Commercial Environment
Financial cryptography
Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography
Advances in Parallel, Distributed Computing; Advances in Parallel, Distributed Computing: Technologies and Applications, PDCTA 2011, Tirunelveli, Tamil Nadu, India, September 23-25, 2011, proceedings
Mahesh, P.K. ; Gudigar, A.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (203):357-365
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops
Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
International Conference on Parallel and Distributed Computing Applications and Technologies; Parallel and distributed computing: applications and technologies : 5th International Conference, PDCAT 2004 Singapore, December 8-10, 2004 proceedings
Setiawan, A. ; Adiutama, D. ; Liman, J. ; et al.
LECTURE NOTES IN COMPUTER SCIENCE. (3320):872-877
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
25th IEEE international conference on distributed computing systems: ICDCS 2005
Chan, A. ; Blake, I.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS. :504-513
The Empirical study and analysis of the Blockchain Technology
Bharti, Vishal ; Anand, Darpan
2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA) Inventive Research in Computing Applications (ICIRCA), 2021 Third International Conference on. :728-734 Sep, 2021
Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing
Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246
An Intelligent Security Systems in Cloud Computing using Cryptography Techniques
Srilakshmi, V ; Chetana, V Lakshmi ; Dornala, Raghunadha Reddi ; et al.
2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC) Electronics and Sustainable Communication Systems (ICESC), 2024 5th International Conference on. :551-556 Aug, 2024
Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing
Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132
Secure data transference architecture for cloud computing using cryptography algorithms
Khari, Manju ; Kumar, Manoj ; Vaishali
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. :2141-2146 Mar, 2016
Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images.
Pandey, D. ; Rawat, U. ; Rathore, N.K. ; et al.
IRBM (1959-0318). Jun2022, Vol. 43 Issue 3, p151-160. 10p.
New Innovations in Cryptography and Its Applications
High Performance Architecture and Grid Computing; HPAGC 2011
Sharma, S. ; Mishra, N.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):527-538
- 1
- 2