Sciweavers

4111 search results - page 155 / 823
» Security, Protocols, and Trust
Sort
View
87
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 24 days ago
Cryptanalysis of Syverson's Rational Exchange Protocol
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence o...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
103
Voted
TRUST
2010
Springer
15 years 5 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
103
Voted
FORTE
2004
15 years 2 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
88
Voted
CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
CCS
2008
ACM
15 years 2 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers