Sciweavers

1777 search results - page 109 / 356
» Programming Cryptographic Protocols
Sort
View
CCGRID
2005
IEEE
15 years 6 months ago
View-oriented update protocol with integrated diff for view-based consistency
This paper proposes a View-Oriented Update Protocol with Integrated Diff for efficient implementation of a View-based Consistency model which supports a novel View-Oriented Paral...
Zhiyi Huang, Martin K. Purvis, Paul Werstein
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
15 years 8 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
FC
2009
Springer
95views Cryptology» more  FC 2009»
15 years 7 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
CSFW
2007
IEEE
15 years 7 months ago
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata
We study simulation relations for Probabilistic Automata that require transitions to be matched up to negligible sets provided that computation lengths are polynomially bounded. T...
Roberto Segala, Andrea Turrini
IEEEARES
2007
IEEE
15 years 7 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma