[HTML][HTML] Blockchain technology for supply chain management: A comprehensive review

A Chang, N El-Rayes, J Shi - FinTech, 2022 - mdpi.com
Firms are eager to adopt new technologies, such as Artificial Intelligence (AI), Cloud
Computing, Big Data, etc., as they witness successful business applications. As one of the …

Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

[HTML][HTML] Secure and energy-efficient framework using Internet of Medical Things for e-healthcare

T Saba, K Haseeb, I Ahmed, A Rehman - Journal of Infection and Public …, 2020 - Elsevier
In various fields, the internet of things (IoT) gains a lot of popularity due to its autonomous
sensors operations with the least cost. In medical and healthcare applications, the IoT …

[Књига][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[Књига][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Practical techniques for searches on encrypted data

DX Song, D Wagner, A Perrig - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
It is desirable to store data on data storage servers such as mail servers and file servers in
encrypted form to reduce security and privacy risks. But this usually implies that one has to …

[Књига][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[Књига][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …

Entity authentication and key distribution

M Bellare, P Rogaway - Annual international cryptology conference, 1993 - Springer
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …

Keying hash functions for message authentication

M Bellare, R Canetti, H Krawczyk - … Barbara, California, USA August 18–22 …, 1996 - Springer
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has
become a standard approach in many applications, particularly Internet security protocols …