Sciweavers

403 search results - page 24 / 81
» An algebra for commitment protocols
Sort
View
RTA
2009
Springer
15 years 8 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
ISCC
2006
IEEE
102views Communications» more  ISCC 2006»
15 years 7 months ago
Protocol Algebra
Anders Moen Hagalisletto
JLP
2008
72views more  JLP 2008»
15 years 1 months ago
Using probabilistic Kleene algebra pKA for protocol verification
A. K. McIver, C. Gonzalia, E. Cohen, Carroll C. Mo...
INFOCOM
2009
IEEE
15 years 8 months ago
Opportunistic Routing Algebra and its Applications
Abstract—Opportunistic routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and spacial diversity of the wireless ...
Mingming Lu, Jie Wu