Sciweavers

325 search results - page 34 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
EUROCRYPT
2005
Springer
14 years 2 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
WSC
1998
13 years 10 months ago
Building Parallel Time-Constrained HLA Federates: A Case Study with the Parsec Parallel Simulation Language
Based on the DIS result, the HLA framework has been defined to achieve interoperability of independent simulators. Concurrently, and for the most part, independent of that effort,...
CongDuc Pham, Rajive Bagrodia
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
14 years 12 days ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
IEEEHPCS
2010
13 years 7 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
ICCAD
1996
IEEE
127views Hardware» more  ICCAD 1996»
14 years 24 days ago
Comparing models of computation
We give a denotational framework (a "meta model") within which certain properties of models of computation can be understood and compared. It describes concurrent proces...
Edward A. Lee, Alberto L. Sangiovanni-Vincentelli