Sciweavers

620 search results - page 78 / 124
» The computational power of population protocols
Sort
View
TKDE
2008
111views more  TKDE 2008»
14 years 9 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
15 years 10 months ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
IPPS
2003
IEEE
15 years 3 months ago
Transparent Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music and many other files over the Internet, and they account for a si...
Sunil Patro, Y. Charlie Hu
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi