Sciweavers

361 search results - page 58 / 73
» Composition of Password-Based Protocols
Sort
View
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 28 days ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ICFP
2006
ACM
14 years 7 months ago
Transactional events
nt programs require high-level abstractions in order to manage complexity and enable compositional reasoning. In this paper, we introduce a novel concurrency abstraction, dubbed t...
Kevin Donnelly, Matthew Fluet
SOFTVIS
2003
ACM
14 years 23 days ago
Visualizing Software for Telecommunication Services
An active research area in telecommunications concerns how to specify and control the addition of new services, such as call waiting or instant messaging, into existing software. ...
Emden R. Gansner, John M. Mocenigo, Stephen C. Nor...
MSE
2002
IEEE
179views Hardware» more  MSE 2002»
14 years 13 days ago
A SOAP-Oriented Component-Based Framework Supporting Device-Independent Multimedia Web Services
A web service is a programmable web application accessible using standard Internet protocols. A threelayer architecture has been suggested for web services: service providers, ser...
Jia Zhang, Jen-Yao Chung