Sciweavers

1186 search results - page 89 / 238
» Goal-Oriented Interaction Protocols
Sort
View
ETS
2002
IEEE
150views Hardware» more  ETS 2002»
13 years 9 months ago
Assessing group learning and shared understanding in technology-mediated interaction
Without shared understanding, hardly any group learning takes place. Though much has been written about the essence of shared understanding, less is known about how to assess the ...
Ingrid Mulder, Janine Swaak, Joseph Kessels
IACR
2011
152views more  IACR 2011»
12 years 9 months ago
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Abstract. In Asiacrypt 2010, Groth constructed the only previously known sublinearcommunication NIZK argument for circuit satisfiability in the common reference string model. We p...
Helger Lipmaa
ACSAC
2005
IEEE
14 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
CRYPTO
2000
Springer
182views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
A Note on the Round-Complexity of Concurrent Zero-Knowledge
Abstract. We present a lower bound on the number of rounds required by Concurrent Zero-Knowledge proofs for languages in NP. It is shown that in the context of Concurrent Zero-Know...
Alon Rosen
BIOWIRE
2007
Springer
14 years 2 months ago
An Artificial Chemistry for Networking
Chemical computing models have been proposed since the 1980ies for expressing concurrent computations in elegant ways for shared memory systems. In this paper we look at the distri...
Thomas Meyer, Lidia Yamamoto, Christian F. Tschudi...