Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
: Web Services can be used to automate business activities that span multiple enterprises over the Internet. Such business activities require a coordination protocol to reach consi...
Wenbing Zhao, Firat Kart, Louise E. Moser, P. M. M...
Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modif...
Sven Helmer, Carl-Christian Kanne, Guido Moerkotte