Search

Your search keyword '"Dining cryptographers problem"' showing total 42 results

Search Constraints

Start Over You searched for: Descriptor "Dining cryptographers problem" Remove constraint Descriptor: "Dining cryptographers problem" Topic computer.software_genre Remove constraint Topic: computer.software_genre
42 results on '"Dining cryptographers problem"'

Search Results

1. Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing

2. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

3. Optimal Information Release for Mixed Opacity in Discrete-Event Systems

4. UMC4M: A Verification Tool via Program Execution

5. HSDC–Net: Secure Anonymous Messaging in Online Social Networks

6. Calculating Quantitative Integrity and Secrecy for Imperative Programs

7. A Novel Symbolic Approach to Verifying Epistemic Properties of Programs

8. From Dining Cryptographers to dining things: Unobservable communication in the IoT

9. Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols

10. Security Analysis of Accountable Anonymity in Dissent

11. A systematic method for choosing optimal parameters for storage in parallel channels of slots

12. Anonymous sealed bid auction protocol based on a variant of the dining cryptographers’ protocol

13. QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY

14. On anonymity in an electronic society

15. The Shadow Knows: Refinement and security in sequential programs

16. Anonymity protocols as noisy channels

17. A Probabilistic Scheduler for the Analysis of Cryptographic Protocols

18. Weak Probabilistic Anonymity

19. Storage Optimization for Non Interactive Dining Cryptographers (NIDC)

20. Automatically Calculating Quantitative Integrity Measures for Imperative Programs

21. A Tool For Specification And Verification Of Epistemic Properties In Interpreted Systems

22. Fast and unconditionally secure anonymous channel

23. Brief announcement

24. Anonymous Broadcast Messages

25. Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net

26. Robustness Guarantees for Anonymity

27. The Thousand-and-One Cryptographers

28. Secret Broadcasts

29. A 2-Round Anonymous Veto Protocol

30. The Power of Anonymous Veto in Public Discussion

31. Security, Probability and Nearly Fair Coins in the Cryptographers’ Café

32. Anonymous Quantum Communication

33. A 2-Round Anonymous Veto Protocol

34. On the Design Dilemma in Dining Cryptographer Networks

35. Verification of Communication Protocols in a Multi-agent System

36. On automated verification of probabilistic programs

37. Measuring Anonymity with Relative Entropy

38. Dining Cryptographers Revisited

39. CSP and Anonymity

40. Untraceable electronic mail, return addresses, and digital pseudonyms

41. What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

42. The dining cryptographers problem: unconditional sender and recipient untraceability

Catalog

Books, media, physical & digital resources