Sciweavers

65 search results - page 4 / 13
» A Formal General Setting for Dialogue Protocols
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
ERSHOV
2003
Springer
14 years 21 days ago
Principles for Entity Authentication
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authenticati...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
SASN
2003
ACM
14 years 22 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
IFIP
2009
Springer
14 years 2 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
GECCO
2007
Springer
187views Optimization» more  GECCO 2007»
14 years 1 months ago
Agent-environment interaction in a multi-agent system: a formal model
In this paper, we introduce a formal-language model for explicitly formalizing agent-environment interaction in a multiagent systems (MAS) framework: Conversational Grammar System...
Gemma Bel Enguix, Maria Dolores Jiménez-L&o...