Sciweavers

1777 search results - page 140 / 356
» Programming Cryptographic Protocols
Sort
View
LICS
1993
IEEE
15 years 5 months ago
Verifying Programs with Unreliable Channels
We consider the veri cation of a particular class of in nite-state systems, namely systems consisting of nite-state processes that communicate via unbounded lossy FIFO channels. T...
Parosh Aziz Abdulla, Bengt Jonsson
UM
2001
Springer
15 years 5 months ago
Perceptual Considerations for Quality of Service Management: An Integrated Architecture
In this paper, we suggest an integrated architecture that makes use of the objective-technical information provided by the designer and the subjectiveperceptual information supplie...
George Ghinea, George D. Magoulas
CCS
2004
ACM
15 years 6 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 1 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
LCN
2007
IEEE
15 years 7 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood