We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. RFID Security

    Living reference work entry 2024
  2. Protocol

    Living reference work entry 2024
  3. Vulnerability Metrics

    Living reference work entry 2024
  4. Threshold Signature

    Living reference work entry 2024
  5. Metrics of Software Security

    Guido Salvaneschi, Paolo Salvaneschi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  6. Theorem Proving and Security

    Living reference work entry 2024
  7. Oblivious RAM (ORAM)

    Alessandro Barenghi, Gerardo Pelosi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  8. Byzantine Agreement

    Living reference work entry 2024
  9. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  10. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  11. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  12. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  13. The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain

    In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential...
    Muhammed F. Esgin, Joseph K. Liu, ... Dimaz Ankaa Wijaya in Blockchains
    Chapter 2024
  14. Supply Chain Management Using Blockchain

    Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory...
    Christopher Klinkmueller, H. M. N. Dilum Bandara, ... Qinghua Lu in Blockchains
    Chapter 2024
  15. Ends, Means and Functions

    The purpose of this chapter is to clarify the distinction between goals and objectives which can be considered as different types of ends....
    Chapter 2024
Did you find what you were looking for? Share feedback.