Sciweavers

1059 search results - page 130 / 212
» Modeling Security Protocols as Games
Sort
View
124
Voted
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
148
Voted
PODC
2003
ACM
15 years 9 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
103
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
107
Voted
IAT
2008
IEEE
15 years 10 months ago
Bargaining in Markets with One-Sided Competition: Model and Analysis
The automation of agents that bargain within markets is a challenging open problem. In these settings a seller agent can take advantage from the competition among several buyer ag...
Nicola Gatti
153
Voted
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig