Sciweavers

2303 search results - page 44 / 461
» The Cryptographic Abstract Machine
Sort
View
102
Voted
CORR
2004
Springer
120views Education» more  CORR 2004»
15 years 2 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
131
Voted
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 8 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...
118
Voted
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 8 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
FC
2005
Springer
134views Cryptology» more  FC 2005»
15 years 8 months ago
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model
Abstract. A multi-party fair exchange protocol is a cryptographic protocol allowing several parties to exchange commodities in such a way that everyone gives an item away if and on...
Aybek Mukhamedov, Steve Kremer, Eike Ritter
FOSAD
2004
Springer
15 years 8 months ago
A Tutorial on Physical Security and Side-Channel Attacks
Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
François Koeune, François-Xavier Sta...