Sciweavers

325 search results - page 35 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
EUROCRYPT
2008
Springer
13 years 10 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
SIGSOFT
2003
ACM
14 years 9 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
LCN
2007
IEEE
14 years 2 months ago
Modified Algorithms for Multilevel GRSB Protocol
— GRSB - Guaranteed, Reliable, Secure Broadcast - is a protocol that provides reliable and secure broadcast / multicast communications [1,2]. It can be implemented in many types ...
Mohammad Asadul Hoque, S. M. Iftekharul Amin, Md. ...
ENTCS
2006
117views more  ENTCS 2006»
13 years 8 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
ACISP
2007
Springer
14 years 20 days ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...