Sciweavers

MMMACNS
2001
Springer
14 years 1 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov
MMMACNS
2001
Springer
14 years 1 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner
MMMACNS
2001
Springer
14 years 1 months ago
On Some Cryptographic Properties of Rijndael
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES)....
Selçuk Kavut, Melek D. Yücel
MMMACNS
2001
Springer
14 years 1 months ago
Composability of Secrecy
Jan Jürjens
MMMACNS
2001
Springer
14 years 1 months ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
MMMACNS
2001
Springer
14 years 1 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
MMMACNS
2001
Springer
14 years 1 months ago
BASIS: A Biological Approach to System Information Security
Victor A. Skormin, José G. Delgado-Frias, D...
ISW
2001
Springer
14 years 1 months ago
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery
Antonio Ruiz-Martínez, Gregorio Martí...