Sciweavers

1777 search results - page 9 / 356
» Programming Cryptographic Protocols
Sort
View
ASM
2003
ASM
14 years 21 days ago
Privacy, Abstract Encryption and Protocols: An ASM Model - Part I
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
Dean Rosenzweig, Davor Runje, Neva Slani
FMCO
2006
Springer
13 years 11 months ago
On Recursion, Replication and Scope Mechanisms in Process Calculi
In this paper we shall survey and discuss in detail the work on the relative expressiveness of recursion and replication in various process calculi. Namely, CCS, the -calculus, the...
Jesús Aranda, Cinzia Di Giusto, Catuscia Pa...
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 7 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
USS
2010
13 years 5 months ago
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
In recent years, many advances have been made in cryptography, as well as in the performance of communication networks and processors. As a result, many advanced cryptographic pro...
Sarah Meiklejohn, C. Christopher Erway, Alptekin K...
FSTTCS
2003
Springer
14 years 20 days ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann