Sciweavers

3751 search results - page 86 / 751
» Events in security protocols
Sort
View
LREC
2008
153views Education» more  LREC 2008»
14 years 11 months ago
Coding Emotional Events in Audiovisual Corpora
The modelling of realistic emotional behaviour is needed for various applications in multimodal human-machine interaction such as the design of emotional conversational agents (Ma...
Laurence Devillers, Jean-Claude Martin
CSFW
2009
IEEE
15 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ISW
2007
Springer
15 years 4 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 4 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 2 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...