Sciweavers

6274 search results - page 53 / 1255
» Proofs, Programs, Processes
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 6 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ESOP
2009
Springer
15 years 6 months ago
Abstract Processes in Orchestration Languages
Maria Grazia Buscemi, Hernán C. Melgratti