Sciweavers

1825 search results - page 73 / 365
» Cryptographic Securities Exchanges
Sort
View
131
Voted
AAI
2004
114views more  AAI 2004»
15 years 3 months ago
Model Checking A Knowledge Exchange Scenario
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires ...
Sieuwert van Otterloo, Wiebe Der, Michael Wooldrid...
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 7 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
138
Voted
SISW
2003
IEEE
15 years 8 months ago
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
Securing data is more important than ever, yet cryptographic file systems still have not received wide use. One barrier to the adoption of cryptographic file systems is that the...
Charles P. Wright, Jay Dave, Erez Zadok
WWW
2007
ACM
16 years 4 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
138
Voted
PPDP
2005
Springer
15 years 9 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...