Sciweavers

232 search results - page 31 / 47
» Verifying persistent security properties
Sort
View
EUROCRYPT
2009
Springer
14 years 9 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
WWW
2005
ACM
14 years 9 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
ACISP
2004
Springer
14 years 2 months ago
Convertible Nominative Signatures
Abstract. A feasible solution to prevent potential misuse of signatures is to put some restrictions on their verification. Therefore S.J.Kim, S.J.Park and D.H.Won introduced the n...
Zhenjie Huang, Yumin Wang
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 3 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
14 years 15 days ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova