Sciweavers

1180 search results - page 93 / 236
» Interaction Protocols in Agentis
Sort
View
136
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
CRYPTO
2000
Springer
182views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
A Note on the Round-Complexity of Concurrent Zero-Knowledge
Abstract. We present a lower bound on the number of rounds required by Concurrent Zero-Knowledge proofs for languages in NP. It is shown that in the context of Concurrent Zero-Know...
Alon Rosen
124
Voted
BIOWIRE
2007
Springer
15 years 4 months ago
An Artificial Chemistry for Networking
Chemical computing models have been proposed since the 1980ies for expressing concurrent computations in elegant ways for shared memory systems. In this paper we look at the distri...
Thomas Meyer, Lidia Yamamoto, Christian F. Tschudi...
84
Voted
DCC
2010
IEEE
15 years 22 days ago
Practical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication ...
Atefeh Mashatan, Douglas R. Stinson
KDD
2006
ACM
185views Data Mining» more  KDD 2006»
16 years 1 months ago
How to Define Searching Sessions on Web Search Engines
We investigate three methods for defining a session on Web search engines. We examine 2,465,145 interactions from 534,507 Web searchers. We compare defining sessions using: 1) Int...
Bernard J. Jansen, Amanda Spink, Vinish Kathuria