Search

Your search keyword '"Dining cryptographers problem"' showing total 88 results

Search Constraints

Start Over You searched for: Descriptor "Dining cryptographers problem" Remove constraint Descriptor: "Dining cryptographers problem"
88 results on '"Dining cryptographers problem"'

Search Results

1. Mapping Petri Nets onto a Calculus of Context-Aware Ambients.

2. Mapping Petri Nets onto a Calculus of Context-Aware Ambients

3. The Power of Anonymous Veto in Public Discussion

4. Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing

5. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

6. Optimal Information Release for Mixed Opacity in Discrete-Event Systems

7. Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks

8. UMC4M: A Verification Tool via Program Execution

9. The Dining Cryptographer Problem-Based Anonymous Quantum Communication via Non-maximally Entanglement State Analysis.

10. HSDC–Net: Secure Anonymous Messaging in Online Social Networks

11. Statistical Model Checking for Hyperproperties

12. Opaque Superlanguages and Sublanguages in Discrete Event Systems

13. Maximum Information Release While Ensuring Opacity in Discrete Event Systems

14. Calculating Quantitative Integrity and Secrecy for Imperative Programs

15. A Novel Symbolic Approach to Verifying Epistemic Properties of Programs

16. From Dining Cryptographers to dining things: Unobservable communication in the IoT

17. A Better Composition Operator for Quantitative Information Flow Analyses

18. Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols

19. Security Analysis of Accountable Anonymity in Dissent

20. Channel Capacity of Concurrent Probabilistic Programs

21. ANOTHER TWIST IN THE DINING CRYPTOGRAPHERS’ PROTOCOL

22. A systematic method for choosing optimal parameters for storage in parallel channels of slots

23. Anonymous sealed bid auction protocol based on a variant of the dining cryptographers’ protocol

24. The Dining Cryptographer Problem-Based Anonymous Quantum Communication via Non-maximally Entanglement State Analysis

25. QUANTUM COMMUNICATION BETWEEN ANONYMOUS SENDER AND ANONYMOUS RECEIVER IN THE PRESENCE OF STRONG ADVERSARY

26. Weak bisimulation for Probabilistic Timed Automata

27. Calibrating the power of schedulers for probabilistic polynomial-time calculus

28. On anonymity in an electronic society

29. Probabilistic and nondeterministic aspects of anonymity

30. The Shadow Knows: Refinement and security in sequential programs

31. Anonymity protocols as noisy channels

32. A Probabilistic Scheduler for the Analysis of Cryptographic Protocols

33. Weak Probabilistic Anonymity

34. Model Checking Temporal Logics of Knowledge Via OBDDs1

35. Storage Optimization for Non Interactive Dining Cryptographers (NIDC)

36. Automatically Calculating Quantitative Integrity Measures for Imperative Programs

37. A Tool For Specification And Verification Of Epistemic Properties In Interpreted Systems

38. Fast and unconditionally secure anonymous channel

39. Metrics for Differential Privacy in Concurrent Systems

40. Dining Cryptographers with 0.924 Verifiable Collision Resolution

41. Brief announcement

42. Opacité quantitative

43. Modularity and Openness in Modeling Multi-Agent Systems

44. Anonymous Broadcast Messages

45. Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net

46. Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem

47. Abstraction for epistemic model checking of dining cryptographers-based protocols

48. Symbolic model checking of probabilistic knowledge

49. Security Protocol Verification and Optimization by Epistemic Model Checking

50. Information Hiding in Probabilistic Concurrent Systems

Catalog

Books, media, physical & digital resources