Sciweavers

3751 search results - page 86 / 751
» Events in security protocols
Sort
View
LREC
2008
153views Education» more  LREC 2008»
15 years 5 months ago
Coding Emotional Events in Audiovisual Corpora
The modelling of realistic emotional behaviour is needed for various applications in multimodal human-machine interaction such as the design of emotional conversational agents (Ma...
Laurence Devillers, Jean-Claude Martin
CSFW
2009
IEEE
15 years 7 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ISW
2007
Springer
15 years 10 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
121
Voted
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 10 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 8 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...