Sciweavers

3333 search results - page 131 / 667
» Abstract Proof Search
Sort
View
126
Voted
ESORICS
2003
Springer
15 years 9 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
103
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Institutional 2-cells and Grothendieck Institutions
Abstract. We propose to use Grothendieck institutions based on 2categorical diagrams as a basis for heterogeneous specification. We prove a number of results about colimits and (so...
Till Mossakowski
CIE
2006
Springer
15 years 7 months ago
Datatype-Generic Reasoning
Abstract. Datatype-generic programs are programs that are parameterised by a datatype. Designing datatype-generic programs brings new challenges and new opportunities. We review th...
Roland Carl Backhouse
139
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
MCU
2007
123views Hardware» more  MCU 2007»
15 years 5 months ago
Study of Limits of Solvability in Tag Systems
Abstract. In this paper we will give an outline of the proof of the solvability of the halting and reachability problem for 2-symbolic tag systems with a deletion number v = 2. Thi...
Liesbeth De Mol