Sciweavers

325 search results - page 8 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 8 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
FOSSACS
2009
Springer
14 years 2 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
ECOOPW
1998
Springer
13 years 11 months ago
Run-Time Adaptability of Synchronization Policies in Concurrent Object Oriented Languages
Adaptability has become one of the most important research areas in concurrent object-oriented systems in recent years. It tries to cope with system evolution by adding/replacing ...
Fernando Sánchez, Juan Hernández N&u...
CSIE
2009
IEEE
14 years 2 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
CSFW
2012
IEEE
11 years 10 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld