Sciweavers

671 search results - page 12 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
WSC
2008
15 years 3 days ago
Phrase based browsing for simulation traces of network protocols
Most discrete event simulation frameworks are able to output simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation o...
Nathan J. Schmidt, Peter Kemper
INDOCRYPT
2004
Springer
15 years 3 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
CSFW
2004
IEEE
15 years 1 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
AGTIVE
2007
Springer
15 years 1 months ago
Generating Domain-Specific Model Editors with Complex Editing Commands
Abstract. Domain specific modeling languages are of increasing importance for the development of software and other systems. Meta tools are needed to support rapid development of d...
Gabriele Taentzer, André Crema, René...