Sciweavers

3088 search results - page 64 / 618
» Multichannel Security Protocols
Sort
View
101
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
A Recovery Protocol for Middleware Replicated Databases Providing GSI
José Enrique Armendáriz-Iñigo...
119
Voted
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
15 years 7 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
149
Voted
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
93
Voted
WWW
2002
ACM
16 years 4 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis