We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authenticati...
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
In this paper, we introduce a formal-language model for explicitly formalizing agent-environment interaction in a multiagent systems (MAS) framework: Conversational Grammar System...