Sciweavers

1054 search results - page 125 / 211
» Secret Communication with Feedback
Sort
View
SFP
2003
14 years 11 months ago
Testing Scheme programming assignments automatically
Abstract In distance learning the lack of direct communication between teachers and learners makes it difficult to provide direct assistance to students while they are solving the...
Manfred Widera
FC
2010
Springer
157views Cryptology» more  FC 2010»
14 years 11 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan
CCS
2009
ACM
15 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 4 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
EUROCRYPT
2008
Springer
14 years 11 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...