Sciweavers

6274 search results - page 53 / 1255
» Proofs, Programs, Processes
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 5 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
POPL
2003
ACM
14 years 10 months ago
The m-calculus: a higher-order distributed process calculus
Alan Schmitt, Jean-Bernard Stefani
ESOP
2009
Springer
14 years 4 months ago
Abstract Processes in Orchestration Languages
Maria Grazia Buscemi, Hernán C. Melgratti