Cryptographic protocols

Results: 3642



#Item
331Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
332Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
333Computing / Communications protocol / Yahalom / Needham–Schroeder protocol / Cryptographic protocols / Data / Information

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:40:00
334

On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks — An Integrated Approach Using Game Theoretical and Cryptographic Techniques ∗

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2005-07-07 15:12:47
    335Secure multi-party computation / Secure two-party computation / PP / Function / Universal composability / Cryptographic protocols / Mathematics / Applied mathematics

    Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay† Jonathan Katz‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:31:04
    336BoKS / Directory services / Cryptographic software / Computer network security / Internet protocols / Internet standards / System software / Software / Computing

    SPECIFICATION PROFILE BOKS SERVERCONTROL Fox Technologies, Inc. | www.foxt.com | |

    Add to Reading List

    Source URL: www.foxt.com

    Language: English - Date: 2015-05-01 09:55:49
    337

    BRICS Basic Research in Computer Science BRICS RSCrazzolara & Winskel: Language, Semantics, and Methods for Cryptographic Protocols Language, Semantics, and Methods for

    Add to Reading List

    Source URL: www.brics.dk

    - Date: 2000-08-30 09:04:03
      338

      Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995 Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

      Add to Reading List

      Source URL: users.ece.cmu.edu

      - Date: 2004-09-25 11:38:53
        339

        Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

        Add to Reading List

        Source URL: jeapostrophe.github.io

        - Date: 2015-05-11 20:44:55
          340

          Basing Cryptographic Protocols on Tamper-Evident Seals Tal Moran∗ Moni Naor∗† Abstract

          Add to Reading List

          Source URL: www.wisdom.weizmann.ac.il

          Language: English - Date: 2008-09-15 04:36:53
            UPDATE