Sciweavers

169 search results - page 8 / 34
» Exceptions in Component Interaction Protocols - Necessity
Sort
View
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
15 years 11 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
CN
2007
121views more  CN 2007»
14 years 11 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal
DALT
2010
Springer
14 years 6 months ago
Commitment-Based Protocols with Behavioral Rules and Correctness Properties of MAS
Commitment-based interaction protocols are a flexible way of representing the interaction of a set of agents, that are well-known and widely accepted by the research community. Nor...
Matteo Baldoni, Cristina Baroglio, Elisa Marengo
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
SOFTWARE
1998
14 years 10 months ago
Focus on Components
A software component is typically modeled from one or more of four functional aspects: interface, static behavior, dynamic behavior, and interaction protocol. Each of these aspect...