Treffer 1 - 20 von 82.426

1

The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
BANGALORE, LAASYA ; CHOUDHURY, ASHISH ; PATRA, ARPITA
Journal of the ACM. May2020, Vol. 67 Issue 3, p1-59. 59p.

Fachzeitschrift
Merkliste
2

A GHZ-Based Protocol for the Dining Information Brokers Problem.
Andronikos, Theodore ; Bitsakos, Constantinos ; Nikas, Konstantinos ; et al.
Future Internet. Sep2025, Vol. 17 Issue 9, p408. 38p.

Information services Privacy Distributed computing Information sharing Quantum entanglement Anonymity
Fachzeitschrift
Merkliste
3

Dieses Ergebnis kann Gästen nicht angezeigt werden.

4

Cryptography and Competition Policy - Issues with `Trusted Computing'
Principles of distributed computing; PODC 2003

Anderson, R.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :3-10

Konferenz
Merkliste
5

Authentication protocol for the Internet of Drones with fog computing based on aggregate signatures for forest inventory.
de Jesus Sousa, Manuela ; Gondim, Paulo Roberto L. ; Sendra, Sandra ; et al.
Ad Hoc Networks. Feb2026, Vol. 181, pN.PAG-N.PAG. 1p.

Forest surveys Public key cryptography Data integrity Commercial drones Electronic authenticatio... Digital signatures
Fachzeitschrift
Merkliste
6

Secure Distributed Computing in a Commercial Environment
Financial cryptography

Golle, P. ; Stubblebine, S.
LECTURE NOTES IN COMPUTER SCIENCE. :289-304

Konferenz
Merkliste
7

Dieses Ergebnis kann Gästen nicht angezeigt werden.

8

Dieses Ergebnis kann Gästen nicht angezeigt werden.

9

Dieses Ergebnis kann Gästen nicht angezeigt werden.

11

Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
International conference on distributed computing systems workshops

Han, J.-H. ; Kim, Y.-J. ; Jun, S.-I. ; et al.
INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS. :272-278

Konferenz
Merkliste
14

The Empirical study and analysis of the Blockchain Technology
Bharti, Vishal ; Anand, Darpan
2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA) Inventive Research in Computing Applications (ICIRCA), 2021 Third International Conference on. :728-734 Sep, 2021

Konferenz
Merkliste
15

Improving the Security of CHAP Protocol by Quantum Cryptography
Intelligent distributed computing

Elboukhari, M. ; Azizi, M. ; Azizi, A.
STUDIES IN COMPUTATIONAL INTELLIGENCE. 315:241-246

Konferenz
Merkliste
16

An Intelligent Security Systems in Cloud Computing using Cryptography Techniques
Srilakshmi, V ; Chetana, V Lakshmi ; Dornala, Raghunadha Reddi ; et al.
2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC) Electronics and Sustainable Communication Systems (ICESC), 2024 5th International Conference on. :551-556 Aug, 2024

Konferenz
Merkliste
17

Random Oracles in Constantinople: Practical Asynchronous Bzyantine Agreement using Cryptography
Principles of distributed computing

Cachin, C. ; Kursawe, K. ; Shoup, V.
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING. :123-132

Konferenz
Merkliste
18

Secure data transference architecture for cloud computing using cryptography algorithms
Khari, Manju ; Kumar, Manoj ; Vaishali
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. :2141-2146 Mar, 2016

Konferenz
Merkliste
19

Distributed Biomedical Scheme for Controlled Recovery of Medical Encrypted Images.
Pandey, D. ; Rawat, U. ; Rathore, N.K. ; et al.
IRBM (1959-0318). Jun2022, Vol. 43 Issue 3, p151-160. 10p.

Diagnostic imaging Image encryption Computer networks Distributed computing Network PC (Computer) Medical protocols
Fachzeitschrift
Merkliste
20

New Innovations in Cryptography and Its Applications
High Performance Architecture and Grid Computing; HPAGC 2011

Sharma, S. ; Mishra, N.K.
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE. (169):527-538

Konferenz
Merkliste

Filter