Sciweavers

361 search results - page 36 / 73
» Composition of Password-Based Protocols
Sort
View
PLDI
2006
ACM
14 years 2 months ago
Continuations and transducer composition
On-line transducers are an important class of computational agent; we construct and compose together many software systems using them, such as stream processors, layered network p...
Olin Shivers, Matthew Might
ECOOPW
1999
Springer
14 years 29 days ago
Piccola - A Small Composition Language
Moore’s Law is pushing us inevitably towards a world of pervasive, wireless, spontaneously networked computing devices. Whatever these devices do, they will have to talk to and n...
Oscar Nierstrasz
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 7 days ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
GI
2010
Springer
13 years 6 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich
CCS
2008
ACM
13 years 10 months ago
Type-checking zero-knowledge
This paper presents the first type system for statically analyzing security protocols that are based on zero-knowledge proofs. We show how several properties offered by zero-knowl...
Michael Backes, Catalin Hritcu, Matteo Maffei