Sciweavers

375 search results - page 57 / 75
» What is Correctness of Security Protocols
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 1 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
CCR
2006
116views more  CCR 2006»
13 years 7 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee
FC
2007
Springer
151views Cryptology» more  FC 2007»
14 years 1 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion
JPDC
2011
131views more  JPDC 2011»
13 years 2 months ago
Conditional e-payments with transferability
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are ...
Bogdan Carbunar, Weidong Shi, Radu Sion