Sciweavers

793 search results - page 27 / 159
» Protocol Modeling with Model Program Composition
Sort
View
SRDS
2003
IEEE
15 years 7 months ago
Distributed Programming for Dummies: A Shifting Transformation Technique
The perfectly synchronized round model provides the abstraction of crash-stop failures with atomic message delivery. This abstraction makes distributed programming very easy. We p...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
ICLP
1992
Springer
15 years 6 months ago
A Declarative View of Inheritance in Logic Programming
We discuss a declarative characterization of inheritance in logic programming. Our approach is inspired both by existing literature on denotational models for inheritance and by e...
Michele Bugliesi
89
Voted
ASIACRYPT
2007
Springer
15 years 8 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
142
Voted
FORMATS
2010
Springer
15 years 4 days ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 8 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...