Sciweavers

10 search results - page 2 / 2
» Formalizing and achieving multiparty agreements via commitme...
Sort
View
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
13 years 10 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
13 years 10 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
13 years 11 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
MSO
2003
13 years 6 months ago
Control System Design of the CERN/CMS Tracker Thermal Screen
The Tracker is one of the CMS (Compact Muon Solenoid experiment) detectors to be installed at the LHC (Large Hadron Collider) accelerator, scheduled to start data taking in 2007. ...
Enzo Carrone, Andromachi Tsirou