Sciweavers

4099 search results - page 132 / 820
» A Framework for Interactive Proof
Sort
View
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
IAT
2006
IEEE
15 years 4 months ago
Designing Commitment-Based Agent Interactions
A key property of agents is that they are social, and hence the design of agent interactions is a crucial part of an agentoriented software engineering methodology. Agent interact...
Michael Winikoff
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
15 years 10 months ago
Toward a general theory of quantum games
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum in...
Gus Gutoski, John Watrous
CSFW
2006
IEEE
15 years 4 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...
WADT
1998
Springer
15 years 2 months ago
Hierarchical Heterogeneous Specifications
We propose a definition of hierarchical heterogeneous formal specifications, where each module is specified according to its own homogeneous logic. We focus on the specification st...
Sophie Coudert, Gilles Bernot, Pascale Le Gall