Sciweavers

403 search results - page 51 / 81
» An algebra for commitment protocols
Sort
View
APN
2008
Springer
15 years 1 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
CRYPTO
2007
Springer
109views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quant...
Ivan Damgård, Serge Fehr, Renato Renner, Lou...
DNIS
2007
Springer
114views Database» more  DNIS 2007»
15 years 6 months ago
Improving the Performance of Read-Only Transactions Through Speculation
A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol i...
Thirumalaisamy Ragunathan, P. Krishna Reddy
STORAGESS
2006
ACM
15 years 5 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
ATAL
2003
Springer
15 years 5 months ago
Continual coordination through shared activities
Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and ...
Bradley J. Clement, Anthony C. Barrett