A model for asynchronous reactive systems and its application to secure message transmission
- 13 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Player Simulation and General Adversary Structures in Perfect Multiparty ComputationJournal of Cryptology, 2000
- Probabilistic Polynomial-Time Equivalence and Security AnalysisPublished by Springer Nature ,1999
- A probabilistic poly-time framework for protocol analysisPublished by Association for Computing Machinery (ACM) ,1998
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982