Sciweavers

1612 search results - page 87 / 323
» About models of security protocols
Sort
View
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
15 years 9 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
SIGCOMM
1997
ACM
15 years 8 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
CRYPTO
2009
Springer
144views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
On the Composition of Public-Coin Zero-Knowledge Protocols
Abstract. We show that only languages in BPP have public-coin, blackbox zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. Thi...
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikstr...
IJSN
2006
116views more  IJSN 2006»
15 years 3 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon
131
Voted
SEMWEB
2004
Springer
15 years 9 months ago
A Semantic Approach for Designing E-Business Protocols
Abstract— Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, ...
Ashok U. Mallya, Munindar P. Singh