Sciweavers

1777 search results - page 91 / 356
» Programming Cryptographic Protocols
Sort
View
LOPSTR
2001
Springer
14 years 2 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
MADNES
2005
Springer
14 years 3 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
CSSE
2006
IEEE
13 years 10 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
JELIA
2004
Springer
14 years 3 months ago
Automatic Compilation of Protocol Insecurity Problems into Logic Programming
Alessandro Armando, Luca Compagna, Yuliya Lierler