Sciweavers

1825 search results - page 62 / 365
» Cryptographic Securities Exchanges
Sort
View
CSFW
2007
IEEE
15 years 10 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
131
Voted
EUC
2008
Springer
15 years 5 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
117
Voted
SP
2006
IEEE
136views Security Privacy» more  SP 2006»
15 years 9 months ago
Simulatable Security and Polynomially Bounded Concurrent Composability
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
Dennis Hofheinz, Dominique Unruh
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 9 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
147
Voted
EG
2007
86views more  EG 2007»
15 years 3 months ago
Towards secure online elections: models, primitives and open issues
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
Emmanouil Magkos, Panayiotis Kotzanikolaou, Christ...