Sciweavers

3115 search results - page 130 / 623
» Synthesizing Secure Protocols
Sort
View
130
Voted
SYNTHESE
2010
89views more  SYNTHESE 2010»
15 years 2 months ago
Proclus on the order of philosophy of nature
In this paper I show that Proclus is an adherent of the Classical Model of Science as set out elsewhere in this issue (de Jong and Betti 2008), and that he adjusts certain conditio...
Marije Martijn
152
Voted
ACSW
2006
15 years 5 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
123
Voted
IACR
2011
94views more  IACR 2011»
14 years 3 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
156
Voted
IACR
2011
147views more  IACR 2011»
14 years 3 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
113
Voted
WISEC
2009
ACM
15 years 10 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel