Sciweavers

659 search results - page 7 / 132
» Compiling and securing cryptographic protocols
Sort
View
CIA
2001
Springer
15 years 4 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
93
Voted
TGC
2005
Springer
15 years 5 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
SEC
1992
15 years 25 days ago
Cryptographic Protocols and Network Security
Patrick Horster, Hans-Joachim Knobloch
CORR
2007
Springer
56views Education» more  CORR 2007»
14 years 11 months ago
Deciding security properties for cryptographic protocols. Application to key cycles
Hubert Comon-Lundh, Véronique Cortier, Euge...