Sciweavers

1106 search results - page 172 / 222
» Automated Design of Security Protocols
Sort
View
CSFW
2008
IEEE
14 years 4 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
CIKM
2008
Springer
13 years 12 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
CN
2004
122views more  CN 2004»
13 years 9 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
ISW
2004
Springer
14 years 3 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
14 years 2 months ago
An Integrated Interface Tool for the Architecture for Agile Assembly
Developing automated assembly systems normally happens in two distinct stages: rst an o -line" stage in which the system is designed and programmed in simulated and then an o...
Jay Gowdy, Zack J. Butler