zero-knowledge protocol
Implementation of Zero Knowledge Protocol in Wireless Security
5
Authentication and Proofing Using Zero Knowledge Protocol
7
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
10
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
12
Wireless Sensor Network Security model using Zero Knowledge Protocol
5
Universally composable zero-knowledge protocol using trusted platform modules
43
A Zero-Knowledge Identification and Key Agreement Protocol
18
Zero Knowledge and Soundness are Symmetric
32
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds
15
Concurrent Non-Malleable Zero Knowledge
28
Practical Relativistic Zero-Knowledge for NP
17
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge
22
M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol
12
Guillou-quisquater protocol for user authentication based on zero knowledge proof
9
AN EFFICIENT AUTHENTICATION PROTOCOL USING ZERO KNOWLEDGE PROPERTY AND PAIRING ON ELLIPTIC CURVES
5
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
48
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
43
Bringing Zero-Knowledge Proofs of Knowledge to Practice
12
Isolated Proofs of Knowledge and Isolated Zero Knowledge
33
Interactive and zero-knowledge proofs
117