Filters








65,878 Hits in 5.5 sec

Multi-party off-the-record messaging

Ian Goldberg, Berkant Ustaoğlu, Matthew D. Van Gundy, Hao Chen
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
We then propose a solution to multi-party off-the-record instant messaging that satisfies the above properties.  ...  Off-the-Record Messaging, proposed in 2004 by Borisov, Goldberg and Brewer, and its subsequent improvements, simulate private two-party meetings.  ...  We also thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1145/1653662.1653705 dblp:conf/ccs/GoldbergUGC09 fatcat:s5sr2ax2kbfudcgq7y2u4gnah4

Performance trade-offs on a secure multi-party relational database

Rogério Pontes, Mário Pinto, Manuel Barbosa, Ricardo Vilaça, Miguel Matos, Rui Oliveira
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
This issue has been tackled by multiple secure databases that provide trade-offs between security, query capabilities and performance.  ...  We propose a SQL database prototype capable of offering a trade-off between security and query latency by using a different secure protocol.  ...  Agreement, and through the European Regional Development Fund (ERDF).  ... 
doi:10.1145/3019612.3019659 dblp:conf/sac/PontesPBVMO17 fatcat:4v37jrnxmjauzpdnyiw4qqi2qa

Speedster: A TEE-assisted State Channel System [article]

Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi
2021 arXiv   pre-print
channels, frozen deposits, and inability to execute multi-party smart contracts.  ...  It supports fast native multi-party contract execution, which is missing in prior TEE-enabled channel networks.  ...  Multi-Party State Channel: As discussed in Section 3.2, designing a multi-party state channel is a fundamental challenge but necessary for many off-chain smart contract use cases, such as the multi-party  ... 
arXiv:2104.01289v1 fatcat:ojnkkjdthnekzntmdurzekm3my

Off-the-Record Instant Messaging for Group Conversation

Jiang Bian, Remzi Seker, Umit Topaloglu
2007 2007 IEEE International Conference on Information Reuse and Integration  
Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet.  ...  This project implements an extension of the two-party OTR protocol, named Group OTR-GOTR.  ...  However, for an off-the-record IM system, some security features need to be reconsidered, particularly, non-repudiation.  ... 
doi:10.1109/iri.2007.4296601 dblp:conf/iri/BianST07 fatcat:6v744mzqlbgzfls2d7sj52c3zu

Remote homeplace communication: what is it like and how might we support it? [chapter]

David M. Frohlich, Kathy Chilton, Paul Drew
1997 People and Computers XII  
We introduce the study of homeplace communication as being relevant to the design of new communication technology for the home market.  ...  After reviewing current approaches to the field, we go on to describe the nature of remote homeplace communication over the telephone, based on a quantitative and qualitative analysis of 315 household  ...  her help and insights on the project.  ... 
doi:10.1007/978-1-4471-3601-9_9 dblp:conf/bcshci/FrohlichCD97 fatcat:mjekwruzsnerzhwd3vjo2yipbu

Negative campaigning and its consequences: a review and a look ahead

Martin Haselmayer
2019 French Politics  
It then reviews why parties and candidates choose to 'go negative' with a particular focus on the rationales for negative campaigning under multi-party competition.  ...  The conclusion summarizes the state of the art and outlines avenues for future research.  ...  This review draws on the author's dissertation on negative campaigning in multi-party competition.  ... 
doi:10.1057/s41253-019-00084-8 fatcat:dyu44oja4feddl7t5qmgtqvkqm

On the Centrality of Off-Line E-Cash to Concrete Partial Information Games [chapter]

Seung Geol Choi, Dana Dachman-Soled, Moti Yung
2012 Lecture Notes in Computer Science  
., secure multi-party computation) and others, due to the importance of the scenario they represent, are designed to solve a concrete problem directly.  ...  ., secure multi-party computation from Oblivious Transfer, signature from one-way functions, etc.).  ...  virtual spend messages from the uncorrupted parties.  ... 
doi:10.1007/978-3-642-32928-9_15 fatcat:qmyji3sw2barpphoaoryas5y34

Page 45119 of The Federal Register / FIND Vol. 71, Issue 152 [page]

2006 The Federal Register / FIND  
to a master list of agreements between tbe parties that is maintained and updated centrally, is available for review by the Secretary upon request, and preserves the historical record of agreements.  ...  drug or devices, off-label marketing, consumer iraud, inappropriate formulary activities, and the like. 5.  ... 

Multiparty nonrepudiation

Jose A. Onieva, Jianying Zhou, Javier Lopez
2008 ACM Computing Surveys  
After that, it presents in more detail the 1-N multi-party non-repudiation solutions for distribution of different messages to multiple recipients.  ...  Finally it discusses the advanced solutions for two typical multi-party non-repudiation applications, i.e., multi-party certified email and multi-party contract signing. Evidence Transfer.  ...  On the other hand, this is the only one we can compare with as an off-line multi-party non-repudiation protocol.  ... 
doi:10.1145/1456650.1456655 fatcat:ygzho6mlevdjpagztwgvezv5r4

Contract signature in e-commerce

Lein Harn, Chu-Hsing Lin
2011 Computers & electrical engineering  
The contract signature scheme adopts a digital multi-signature scheme in public-key cryptography to facilitate fair signature exchange over network.  ...  In case any signer releases the partial signature to others, the signer does not bind to the contract.  ...  This multi-signature allows any number of signers to work together to generate a digital multi-signature corresponding to a message.  ... 
doi:10.1016/j.compeleceng.2011.02.001 fatcat:dawmyxvh7zfene6o6aba6ldmby

Universally composable one-time signature and broadcast authentication

JunWei Zhang, JianFeng Ma, SangJae Moon
2010 Science China Information Sciences  
At the same time, a protocol OWC using one-way chains is proposed to provide more registered keys for multi-message broadcast authentication.  ...  Broadcast authentication is a vital security primitive for the management of a copious number of parties.  ...  F BAUTH would reveal all the contents of broadcasted messages to the adversary. Authentication. If uncorrupted party B broadcasts a message m, then other parties would receive the message m.  ... 
doi:10.1007/s11432-010-0056-2 fatcat:dp2epgjfjjcqvcp7mfsapxjwgy

Programming service tests with TTCN [chapter]

Martin Anlauf
1998 Testing of Communicating Systems  
The requirements of the experiment and the nature of the test cases under consideration are described. The importance of concurrency is emphasized.  ...  The methodology of development is outlined, including the derivation of test purposes from verbal descriptions. The test method is indicated.  ...  ACKNOWLEDGEMENTS The author would like to thank ,all people that supported the RESTATE project, especially to Jorn Miinzel, to Bertram Weber and to Helmut Meyer.  ... 
doi:10.1007/978-0-387-35381-4_16 fatcat:w5wcwz2vzrhftdvomyg4qltemq

Universal Payment Channels: An Interoperability Platform for Digital Currencies [article]

Mihai Christodorescu, Erin English, Wanyun Catherine Gu, David Kreissman, Ranjit Kumaresan, Mohsen Minaei, Srinivasan Raghuraman, Cuy Sheffield, Arjuna Wijeyekoon, Mahdi Zamani
2021 arXiv   pre-print
As the number of DLT networks increases, each with varying design characteristics, the likelihood that transacting parties are on the same network decreases.  ...  Finally, through the paper, we share some future directions of the UPC technology.  ...  .............. 12 Disclaimer ................................................................................................................................................. 13 Acknowledgement The  ... 
arXiv:2109.12194v2 fatcat:e2sgo4tsqbhnfnujqkcd7cbuzq

Universally Composable Secure Mobile Agent Computation [chapter]

Ke Xu, Stephen R. Tate
2004 Lecture Notes in Computer Science  
Finally, under the assumption of a universally composable threshold cryptosystem, we present universally composable, multi-agent protocols with provable security against either static, semi-honest or static  ...  Our definition provides security for all the participants in the mobile agent system: the originator as well as the hosts.  ...  If this is the mth recorded DecryptAssist for ciphertext pair (c 0 , c 1 ), then: If an encryption request has recorded a pair (c b , w b ), then return w b to P j (the party that made the corresponding  ... 
doi:10.1007/978-3-540-30144-8_26 fatcat:jvvzt2xfizhp7nxz6iko6qzkl4

Multicast address management and connection control based on hierarchical autonomous structure

Jian Wang, Fuyan Zhang
1999 Journal of Computer Science and Technology  
The paper also describes the normal operations of multicast address management and multi-point connections controller.  ...  Connection control hierarchy (CCH) based on master/slave relationship and a simple efficient building algorithm of multi-point connection is also built.  ...  These limitations hinder further development and deployment of multi-party applications, and unnecessarily move the burden of network management operations to the users.  ... 
doi:10.1007/bf02952489 fatcat:x5fn6uoiqvcnte5ocsdssowhtm
« Previous Showing results 1 — 15 out of 65,878 results