Sciweavers

169 search results - page 8 / 34
» Exceptions in Component Interaction Protocols - Necessity
Sort
View
140
Voted
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
16 years 3 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
104
Voted
CN
2007
121views more  CN 2007»
15 years 3 months ago
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
—Interactivity in the transport protocol can greatly benefit transport friendly applications generating streaming traffic. Recently we have developed iTCP, which can provide even...
Javed I. Khan, Raid Zaghal
131
Voted
DALT
2010
Springer
14 years 10 months ago
Commitment-Based Protocols with Behavioral Rules and Correctness Properties of MAS
Commitment-based interaction protocols are a flexible way of representing the interaction of a set of agents, that are well-known and widely accepted by the research community. Nor...
Matteo Baldoni, Cristina Baroglio, Elisa Marengo
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
126
Voted
SOFTWARE
1998
15 years 3 months ago
Focus on Components
A software component is typically modeled from one or more of four functional aspects: interface, static behavior, dynamic behavior, and interaction protocol. Each of these aspect...