Sciweavers

325 search results - page 34 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
159
Voted
EUROCRYPT
2005
Springer
15 years 9 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
WSC
1998
15 years 5 months ago
Building Parallel Time-Constrained HLA Federates: A Case Study with the Parsec Parallel Simulation Language
Based on the DIS result, the HLA framework has been defined to achieve interoperability of independent simulators. Concurrently, and for the most part, independent of that effort,...
CongDuc Pham, Rajive Bagrodia
148
Voted
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 7 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
159
Voted
IEEEHPCS
2010
15 years 2 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
ICCAD
1996
IEEE
127views Hardware» more  ICCAD 1996»
15 years 8 months ago
Comparing models of computation
We give a denotational framework (a "meta model") within which certain properties of models of computation can be understood and compared. It describes concurrent proces...
Edward A. Lee, Alberto L. Sangiovanni-Vincentelli