Sciweavers

1166 search results - page 71 / 234
» Adaptively Secure Broadcast
Sort
View
ESORICS
2007
Springer
15 years 6 months ago
Adaptive Soundness of Static Equivalence
Abstract. We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equiva...
Steve Kremer, Laurent Mazaré
108
Voted
AGENTS
2001
Springer
15 years 5 months ago
Using self-diagnosis to adapt organizational structures
The specific organization used by a multi-agent system is crucial for its effectiveness and efficiency. In dynamic environments, or when the objectives of the system shift, the ...
Bryan Horling, Brett Benyo, Victor R. Lesser
88
Voted
JOC
2006
69views more  JOC 2006»
15 years 16 days ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
93
Voted
ICDCSW
2003
IEEE
15 years 5 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ESORICS
2002
Springer
16 years 5 days ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe