Sciweavers

3751 search results - page 211 / 751
» Events in security protocols
Sort
View
MASCOTS
2010
15 years 5 months ago
Expanding the Event Horizon in Parallelized Network Simulations
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technolog...
Georg Kunz, Olaf Landsiedel, Stefan Götz, Kla...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 5 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
CSFW
2004
IEEE
15 years 8 months ago
Formal Analysis of Multi-Party Contract Signing
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
Rohit Chadha, Steve Kremer, Andre Scedrov
ECR
2006
81views more  ECR 2006»
15 years 4 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
PADS
2000
ACM
15 years 8 months ago
Applying parallel discrete event simulation to network emulation
The simulation of wide area computer networks is one area where the benefits of parallel simulation have been clearly demonstrated. Here we present a description of a system that...
Rob Simmonds, Russell Bradford, Brian Unger