Sciweavers

1777 search results - page 114 / 356
» Programming Cryptographic Protocols
Sort
View
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 1 months ago
Weak Verifiable Random Functions
Verifiable random functions (VRFs), introduced by Micali, Rabin and Vadhan, are pseudorandom functions in which the owner of the seed produces a public-key that constitutes a commi...
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum...
ICCL
1998
IEEE
15 years 5 months ago
A Lightweight Object Migration Protocol
This paper presents a lightweight object migration protocol that preserves centralized object semantics yet allows for precise prediction of network behavior. The protocol is impl...
Peter Van Roy, Per Brand, Seif Haridi, Raphaë...
IFIP
2009
Springer
14 years 11 months ago
Game-Based Verification of Multi-Party Contract Signing Protocols
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw
CASSIS
2004
Springer
15 years 6 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
TGC
2007
Springer
15 years 7 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou