Sciweavers

24529 search results - page 345 / 4906
» Computing on Authenticated Data
Sort
View
CONCUR
2005
Springer
15 years 9 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
ICN
2005
Springer
15 years 9 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
CSCW
2004
ACM
15 years 9 months ago
Hiding and revealing in online poker games
Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to t...
Scott A. Golder, Judith S. Donath
133
Voted
GRID
2004
Springer
15 years 9 months ago
Walden: A Scalable Solution for Grid Account Management
— A large and diverse consortium of grid clusters, as can be found in a university setting, requires a flexible authorization model that is scalable, extensible and easy to admi...
Beth A. Kirschner, Thomas J. Hacker, William A. Ad...
ACSAC
2002
IEEE
15 years 9 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford