Sciweavers

4305 search results - page 600 / 861
» Analysing Protocol Implementations
Sort
View
EUROCRYPT
1995
Springer
15 years 8 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
CSE
2009
IEEE
15 years 8 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
NSDI
2007
15 years 7 months ago
X-Trace: A Pervasive Network Tracing Framework
Modern Internet systems often combine different applications (e.g., DNS, web, and database), span different administrative domains, and function in the context of network mechanis...
Rodrigo Fonseca, George Porter, Randy H. Katz, Sco...
USS
2008
15 years 7 months ago
Helios: Web-based Open-Audit Voting
Voting with cryptographic auditing, sometimes called open-audit voting, has remained, for the most part, a theoretical endeavor. In spite of dozens of fascinating protocols and re...
Ben Adida
WSC
2007
15 years 7 months ago
Optimizing time warp simulation with reinforcement learning techniques
Adaptive Time Warp protocols in the literature are usually based on a pre-defined analytic model of the system, expressed as a closed form function that maps system state to cont...
Jun Wang, Carl Tropper