Sciweavers

659 search results - page 7 / 132
» Compiling and securing cryptographic protocols
Sort
View
CIA
2001
Springer
13 years 12 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
TGC
2005
Springer
14 years 26 days ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
SEC
1992
13 years 8 months ago
Cryptographic Protocols and Network Security
Patrick Horster, Hans-Joachim Knobloch
CORR
2007
Springer
56views Education» more  CORR 2007»
13 years 7 months ago
Deciding security properties for cryptographic protocols. Application to key cycles
Hubert Comon-Lundh, Véronique Cortier, Euge...