Sciweavers

224 search results - page 17 / 45
» Transformations between Cryptographic Protocols
Sort
View
131
Voted
ICDCS
2010
IEEE
15 years 12 days ago
Fault-Containing Self-Stabilization in Asynchronous Systems with Constant Fault-Gap
This paper presents a new transformation which adds fault-containment properties to any silent self-stabilizing protocol. The transformation features a constant slow-down factor a...
Sven Köhler, Volker Turau
CSFW
2012
IEEE
13 years 4 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
105
Voted
JOC
2007
93views more  JOC 2007»
15 years 1 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
112
Voted
PET
2010
Springer
15 years 5 months ago
Anonymous Webs of Trust
Abstract. Webs of trust constitute a decentralized infrastructure for establishing the authenticity of the binding between public keys and users and, more generally, trust relation...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
159
Voted
FORTE
2009
14 years 11 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...