Sciweavers

144 search results - page 16 / 29
» Fair exchange in E-commerce
Sort
View
FCT
2003
Springer
15 years 3 months ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi
CCS
2006
ACM
15 years 1 months ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
IFIP12
2008
14 years 11 months ago
Applying Data Mining to the Study of Joseki
Go is a strategic two player boardgame of Chinese origin. In terms of game theory, it is a deterministic perfect information game. But despite of these factors it is terribly comp...
Michiel Helvensteijn
IJNSEC
2008
190views more  IJNSEC 2008»
14 years 9 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
TWC
2008
111views more  TWC 2008»
14 years 9 months ago
A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
Abstract-- Multiuser diversity gains can be achieved by assigning channels to users with better channel quality in multiuser systems. To avoid the extensive information exchange re...
Dandan Wang, Cristina Comaniciu, Hlaing Minn, Naof...