Sciweavers

3751 search results - page 517 / 751
» Events in security protocols
Sort
View
157
Voted
IGPL
2010
117views more  IGPL 2010»
15 years 2 months ago
Executable specification of open multi-agent systems
Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent's internal state, are often classified as `ope...
Alexander Artikis, Marek J. Sergot
EJWCN
2011
77views more  EJWCN 2011»
14 years 12 months ago
Emulating Opportunistic Networks with KauNet Triggers
In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. ...
Tanguy Pérennou, Anna Brunstrom, Tomas Hall...
TCC
2010
Springer
178views Cryptology» more  TCC 2010»
16 years 1 months ago
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new choice of parameters. By a recent classical reduction by Peikert we prove the scheme sema...
Rikke Bendlin, Ivan Damgård
ISW
2009
Springer
15 years 11 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 11 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich