Sok: Communication across distributed ledgers

A Zamyatin, M Al-Bassam, D Zindros… - … Cryptography and Data …, 2021 - Springer
Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and
purpose has been created. While by design, blockchains provide no means to securely …

[图书][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life

R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …

Automated security protocol analysis with the AVISPA tool

L Vigano - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security
Protocols and Applications. It provides a modular and expressive formal language for …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

Optimistic fair exchange of digital signatures

N Asokan, V Shoup, M Waidner - … on the Theory and Applications of …, 1998 - Springer
We present a new protocol that allows two players to exchange digital signatures over the
Internet in a fair way, so that either each player gets the other's signature, or neither player …

Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

[PDF][PDF] On the impossibility of fair exchange without a trusted third party

H Pagnia, FC Gärtner - 1999 - Citeseer
We attempt to formally de ne the strong fair exchange problem and present a proof that it is
impossible to solve strong fair exchange without a trusted third party. The proof is …

Disentangling features in 3D face shapes for joint face reconstruction and recognition

F Liu, R Zhu, D Zeng, Q Zhao… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
This paper proposes an encoder-decoder network to disentangle shape features during 3D
face shape reconstruction from single 2D images, such that the tasks of learning …

An intensive survey of fair non-repudiation protocols

S Kremer, O Markowitch, J Zhou - Computer communications, 2002 - Elsevier
With the phenomenal growth of the Internet and open networks in general, security services,
such as non-repudiation, become crucial to many applications. Non-repudiation services …

Bitcoin-based fair payments for outsourcing computations of fog devices

H Huang, X Chen, Q Wu, X Huang, J Shen - Future Generation Computer …, 2018 - Elsevier
Fog computing can be viewed as an extension of cloud computing that enables transactions
and resources at the edge of the network. In the paradigms of fog computing, the fog user …