Sciweavers

403 search results - page 59 / 81
» An algebra for commitment protocols
Sort
View
NN
2002
Springer
119views Neural Networks» more  NN 2002»
14 years 11 months ago
Category regions as new geometrical concepts in Fuzzy-ART and Fuzzy-ARTMAP
In this paper we introduce novel geometric concepts, namely category regions, in the original framework of Fuzzy-ART (FA) and FuzzyARTMAP (FAM). The definitions of these regions a...
Georgios C. Anagnostopoulos, Michael Georgiopoulos
IACR
2011
107views more  IACR 2011»
13 years 11 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CONEXT
2009
ACM
15 years 29 days ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
ESORICS
2008
Springer
15 years 1 months ago
State Space Reduction in the Maude-NRL Protocol Analyzer
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different ...
Santiago Escobar, Catherine Meadows, José M...