Sciweavers

22 search results - page 5 / 5
» A new framework for efficient password-based authenticated k...
Sort
View
JOC
2011
157views more  JOC 2011»
13 years 13 days ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
JECR
2002
120views more  JECR 2002»
13 years 5 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist