Cryptographic nonce

Results: 122



#Item
21ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
22Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-03 04:11:29
23CHAPTER  3 Protocols It is impossible to foresee the consequences of being clever.

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
24Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 2 Protocols

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
25Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bravenewcoin.com

Language: English - Date: 2014-07-15 20:21:51
26Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
271  Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

1 Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-04-26 12:59:27
28Authenticity by Tagging and Typing  ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
29Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
30iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1  2

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58