Sciweavers

659 search results - page 75 / 132
» Compiling and securing cryptographic protocols
Sort
View
108
Voted
AMW
2010
15 years 2 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CCS
2011
ACM
14 years 15 days ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
116
Voted
EUROCRYPT
2008
Springer
15 years 2 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
ACSAC
2003
IEEE
15 years 4 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
98
Voted
JUCS
2007
88views more  JUCS 2007»
15 years 13 days ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic