Sciweavers

325 search results - page 54 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
SDL
2003
147views Hardware» more  SDL 2003»
13 years 10 months ago
Modelling and Evaluation of a Network on Chip Architecture Using SDL
Network on Chip (NoC) is a new paradigm for designing large and complex systems on chips (SoCs). In this paradigm, a packet switched network is provided for on-chip communication. ...
Rickard Holsmark, Magnus Högberg, Shashi Kuma...
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 9 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 2 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
JOC
2000
181views more  JOC 2000»
13 years 8 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
ICSOC
2009
Springer
14 years 3 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...