Sciweavers

157 search results - page 10 / 32
» Universally Composable Signcryption
Sort
View
SP
2006
IEEE
136views Security Privacy» more  SP 2006»
15 years 5 months ago
Simulatable Security and Polynomially Bounded Concurrent Composability
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
Dennis Hofheinz, Dominique Unruh
CN
2006
109views more  CN 2006»
14 years 11 months ago
Quality of service provisioning for composable routing elements
Quality of service (QoS) provisioning for dynamically composable software elements in a programmable router has not received much attention. We present a router platform that supp...
Seung Chul Han, Puneet Zaroo, David K. Y. Yau, Yu ...
WSC
2000
15 years 1 months ago
Model composability as a research investment: responses to the featured paper
Responses to the featured paper are provided by four authors who represent different elements of the simulation research community: industry, private research laboratory, and univ...
Paul C. Davis, Paul A. Fishwick, C. Michael Overst...
NIME
2004
Springer
114views Music» more  NIME 2004»
15 years 5 months ago
Tree Music: Composing with GAIA
In this report, we discuss Tree Music, an interactive computer music installation created using GAIA (Graphical Audio Interface Application), a new open-source interface for contr...
Judith Shatin, David Topper
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 3 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal