Sciweavers

403 search results - page 24 / 81
» An algebra for commitment protocols
Sort
View
RTA
2009
Springer
15 years 6 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
ISCC
2006
IEEE
102views Communications» more  ISCC 2006»
15 years 5 months ago
Protocol Algebra
Anders Moen Hagalisletto
JLP
2008
72views more  JLP 2008»
14 years 11 months ago
Using probabilistic Kleene algebra pKA for protocol verification
A. K. McIver, C. Gonzalia, E. Cohen, Carroll C. Mo...
INFOCOM
2009
IEEE
15 years 6 months ago
Opportunistic Routing Algebra and its Applications
Abstract—Opportunistic routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and spacial diversity of the wireless ...
Mingming Lu, Jie Wu