Back to Results
First PageMeta Content
Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information


Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de
Add to Reading List

Document Date: 2014-08-21 13:21:17


Open Document

File Size: 391,84 KB

Share Result on Facebook

City

Pessoa / /

Company

Needham / /

Country

Brazil / United Kingdom / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

University of Rijeka / University of Pennsylvania / University of London / Federal University / /

IndustryTerm

bank@math.uniri.hr / bounded memory protocol / given protocol / concurrent protocols / bounded memory protocols / memory protocols / collaborative systems / /

Organization

University of Pennsylvania / Philadelphia / University of Rijeka / Federal University / University of London / /

Person

Bob / Andre Scedrov / Alice / Max Kanovich / Ai / Schroeder / Bi / Vivek Nigam / Ban Kirigin / /

Position

Queen Mary / tape head / head / /

Product

A1 / DLMS04 / /

ProvinceOrState

Alaska / Pennsylvania / /

Technology

messages modulo encryption / bounded memory protocols / bounded memory protocol / well-founded protocols / bounded protocol / given protocol / all bounded memory protocols / memory protocols / /

SocialTag