Sciweavers

117 search results - page 7 / 24
» Concurrent general composition of secure protocols in the ti...
Sort
View
IFM
2000
Springer
104views Formal Methods» more  IFM 2000»
13 years 10 months ago
Structuring Real-Time Object-Z Specifications
This paper presents a means of structuring specifications in real-time Object-Z: an integration of Object-Z with the timed refinement calculus. Incremental modification of classes ...
Graeme Smith, Ian J. Hayes
ASIACRYPT
2007
Springer
14 years 27 days ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
CCS
2001
ACM
13 years 11 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 7 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
CIS
2004
Springer
14 years 3 days ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu