Sciweavers

1777 search results - page 82 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
2009
Springer
14 years 3 months ago
Integrating Automated and Interactive Protocol Verification
Achim D. Brucker, Sebastian Mödersheim
CJ
2000
85views more  CJ 2000»
13 years 8 months ago
Arguments and Results
If an object oriented program is a collection of communicating objects, then the objects' protocols de ne the languages the program speaks. Unfortunately, protocols are di cu...
James Noble
ACSAC
2008
IEEE
14 years 3 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
IEEEARES
2007
IEEE
14 years 3 months ago
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, indiv...
Orhan Cetinkaya, Ali Doganaksoy