Sciweavers

27 search results - page 6 / 6
» Streams and strings in formal proofs
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 21 days ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
JELIA
2010
Springer
14 years 10 months ago
Stable Belief Sets Revisited
Stable belief sets were introduced by R. Stalnaker in the early ’80s, as a formal representation of the epistemic state for an ideal introspective agent. This notion motivated M...
Costas D. Koutras, Yorgos Zikos