Showing 21 - 40 results of 80 for search '"Crypto "', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    Decentralised Finance (DeFi) — How Tokenisation is Changing the Financial Industry by Volker Brühl

    Published 2021-08-01
    “…An important driver for this development is the ongoing tokenisation of assets, payments and rights, which enables the digital encryption of “crypto assets” on distributed ledgers. This article elaborates the foundations and fields of application of decentralised financial services with crypto assets that could challenge the established business models of financial institutions. …”
    Get full text
    Article
  15. 35

    Motivations of Retailers Accepting Cryptocurrency Payments and Their Implications on Retail Customer Experience by Muhammed Ali Yetgin, Kasım Yılmaz, Volkan Temizkan

    Published 2022-01-01
    “…However, it has been found that there are also consumers who are totally unaware of the existence of payments with crypto currencies. Some consumers do not prefer payments with crypto currencies either because of low technology usage level or lack of trust to the system. …”
    Get full text
    Article
  16. 36
  17. 37

    On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory by Mohammad Abobala, Hasan Sankari, Mohamed Zeina

    Published 2024-03-01
    “…Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia. …”
    Get full text
    Article
  18. 38

    THE PHENOMENON OF CRYPTOCURRENCY FROM DIVERSE PERSPECTIVES by Živilė Nemickienė

    Published 2019-12-01
    “…The growth of crypto industry develops vigorous, especially in recent years, moving from a universally controlled electronic cash system society to complete financial freedom. …”
    Get full text
    Article
  19. 39

    Enterprise internal audit data encryption based on blockchain technology. by Lixia Gao

    Published 2025-01-01
    “…Utilizing homomorphic Paillier encryption, BlockCryptoAudit ensures that computations may be performed on encrypted audit data while safeguarding data privacy. …”
    Get full text
    Article
  20. 40

    Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols by FENG Chao, ZHANG Quan, TANG Chao-jing

    Published 2011-01-01
    “…A computationally observational equivalence model for the Diffe-Hellman key agreement primitive was pro-posed and the soundness of the model was proved.Compared with prior works,this model can extend the power of the mechanized prover CryptoVerif directly.When applying the model to proving the public-key Kerberos,the deficiency of the adversary’s capability was uncovered and an enhanced model for the adversary was presented.The model was vali-dated by verifying the public-key Kerberos in Diffie-Hellman mode with CryptoVerif automatically.Being different from current approaches,the verification procedure is both automatic and computationally sound.…”
    Get full text
    Article