Sciweavers

349 search results - page 7 / 70
» Compositional Security for Task-PIOAs
Sort
View
112
Voted
ASIACRYPT
2010
Springer
14 years 11 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CSFW
1996
IEEE
15 years 6 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
CCS
2003
ACM
15 years 7 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
SOCIALCOM
2010
14 years 11 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu