Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Accountability: definition and relationship to verifiability
R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …
auction, identity-based encryption, and certain forms of secure multi-party computation …
Towards a theory of accountability and audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means
to enforce authorization policies. In this paper, we describe an operational model of …
to enforce authorization policies. In this paper, we describe an operational model of …
Fair exchange
H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …
in this area has led research into studying methods of how to perform safe and secure online …
LTL model checking for security protocols
Most model checking techniques for security protocols make a number of simplifying
assumptions on the protocol and/or on its execution environment that greatly complicate or …
assumptions on the protocol and/or on its execution environment that greatly complicate or …
Security protocol design via authentication tests
JD Guttman - Proceedings 15th IEEE Computer Security …, 2002 - ieeexplore.ieee.org
We describe a protocol design process, and illustrate its use by creating ATSPECT, an
authentication test-based secure protocol for electronic commerce transactions. The design …
authentication test-based secure protocol for electronic commerce transactions. The design …
Formal analysis of multiparty contract signing
We analyze the multiparty contract-signing protocols of Garay and MacKenzie (GM) and of
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …
Baum and Waidner (BW). We use a finite-state tool, M ocha, which allows specification of …
Three-valued abstractions of games: Uncertainty, but with precision
L De Alfaro, P Godefroid… - Proceedings of the 19th …, 2004 - ieeexplore.ieee.org
We present a framework for abstracting two-player turn-based games that preserves any
formula of the alternating/spl mu/-calculus (AMC). Unlike traditional conservative …
formula of the alternating/spl mu/-calculus (AMC). Unlike traditional conservative …
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to
automatically analyse properties of probabilistic contract signing protocols. We use the …
automatically analyse properties of probabilistic contract signing protocols. We use the …
Abuse-freeness in contract signing: a blockchain-based proposal
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …
Expressing receipt-freeness and coercion-resistance in logics of strategic ability: Preliminary attempt
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on
the strategic aspect of information security in voting procedures. We argue that the notions of …
the strategic aspect of information security in voting procedures. We argue that the notions of …