Sciweavers

14824 search results - page 2716 / 2965
» Security - Introduction
Sort
View
CORR
2010
Springer
72views Education» more  CORR 2010»
15 years 3 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 3 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
CORR
2010
Springer
64views Education» more  CORR 2010»
15 years 3 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 3 months ago
Game Theory with Costly Computation
We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resul...
Joseph Y. Halpern, Rafael Pass
CSI
2010
91views more  CSI 2010»
15 years 3 months ago
Towards trustworthy e-voting using paper receipts
Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proofs or confirming evidences of their honesty. This lack of trust...
Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo...
« Prev « First page 2716 / 2965 Last » Next »