Belardinelli, Francesco; Condurache, Rodica; Dima, Cătălin; Jamroga, Wojciech; Knapik, Michal Bisimulations for verifying strategic abilities with an application to the ThreeBallot voting protocol. (English) Zbl 07307496 Inf. Comput. 276, Article ID 104552, 25 p. (2021). MSC: 68Q PDF BibTeX XML Cite \textit{F. Belardinelli} et al., Inf. Comput. 276, Article ID 104552, 25 p. (2021; Zbl 07307496) Full Text: DOI
Chevalier, Céline; Laguillaumie, Fabien; Vergnaud, Damien Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. (English) Zbl 07303844 Algorithmica 83, No. 1, 72-115 (2021). MSC: 68W 05C PDF BibTeX XML Cite \textit{C. Chevalier} et al., Algorithmica 83, No. 1, 72--115 (2021; Zbl 07303844) Full Text: DOI
Shinagawa, Kazumasa; Nuida, Koji A single shuffle is enough for secure card-based computation of any Boolean circuit. (English) Zbl 07289386 Discrete Appl. Math. 289, 248-261 (2021). MSC: 94 68 PDF BibTeX XML Cite \textit{K. Shinagawa} and \textit{K. Nuida}, Discrete Appl. Math. 289, 248--261 (2021; Zbl 07289386) Full Text: DOI
Hiwatashi, Keitaro; Ohata, Satsuya; Nuida, Koji An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks. (English) Zbl 07314291 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 357-376 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{K. Hiwatashi} et al., Lect. Notes Comput. Sci. 12146, 357--376 (2020; Zbl 07314291) Full Text: DOI
Aiyer, Anand; Liang, Xiao; Nalini, Nilu; Pandey, Omkant Random walks and concurrent zero-knowledge. (English) Zbl 07314275 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 24-44 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A. Aiyer} et al., Lect. Notes Comput. Sci. 12146, 24--44 (2020; Zbl 07314275) Full Text: DOI
Borst, S. C.; den Hollander, F.; Nardi, Francesca Romana; Sfragara, M. Transition time asymptotics of queue-based activation protocols in random-access networks. (English) Zbl 07312463 Stochastic Processes Appl. 130, No. 12, 7483-7517 (2020). MSC: 60K25 60K30 90B15 90B18 PDF BibTeX XML Cite \textit{S. C. Borst} et al., Stochastic Processes Appl. 130, No. 12, 7483--7517 (2020; Zbl 07312463) Full Text: DOI
Sandholm, William H. Evolutionary game theory. (English) Zbl 07309885 Sotomayor, Marilda (ed.) et al., Complex social and behavioral systems. Game theory and agent-based models. New York, NY: Springer (ISBN 978-1-0716-0367-3/print; 978-1-0716-0368-0/ebook; 978-1-0716-0369-7/print+ebook). Encyclopedia of Complexity and Systems Science Series; Springer Reference, 573-608 (2020). MSC: 91A22 PDF BibTeX XML Cite \textit{W. H. Sandholm}, in: Complex social and behavioral systems. Game theory and agent-based models. New York, NY: Springer. 573--608 (2020; Zbl 07309885) Full Text: DOI
Harz, Dominik; Gudgeon, Lewis; Khalil, Rami; Zamyatin, Alexei Promise: leveraging future gains for collateral reduction. (English) Zbl 07304457 Pardalos, Panos (ed.) et al., Mathematical research for blockchain economy. Proceedings of the 2nd international conference on mathematical research for blockchain economy, MARBLE 2020, Vilamoura, Portugal, June 8–10, 2020. Cham: Springer (ISBN 978-3-030-53355-7/hbk; 978-3-030-53356-4/ebook). Springer Proceedings in Business and Economics, 143-160 (2020). MSC: 91B99 91A20 PDF BibTeX XML Cite \textit{D. Harz} et al., in: Mathematical research for blockchain economy. Proceedings of the 2nd international conference on mathematical research for blockchain economy, MARBLE 2020, Vilamoura, Portugal, June 8--10, 2020. Cham: Springer. 143--160 (2020; Zbl 07304457) Full Text: DOI
Ren, Pengfei; Dai, Hao; Chen, Weisheng Distributed cooperative learning over time-varying random networks using a gossip-based communication protocol. (English) Zbl 1452.68157 Fuzzy Sets Syst. 394, 124-145 (2020). MSC: 68T05 68M12 68T37 PDF BibTeX XML Cite \textit{P. Ren} et al., Fuzzy Sets Syst. 394, 124--145 (2020; Zbl 1452.68157) Full Text: DOI
Grier, Daniel; Schaeffer, Luke Interactive shallow Clifford circuits: quantum advantage against NC\(^1\) and beyond. (English) Zbl 07298295 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 875-888 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{D. Grier} and \textit{L. Schaeffer}, in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 875--888 (2020; Zbl 07298295) Full Text: DOI
Berenbrink, Petra; Giakkoupis, George; Kling, Peter Optimal time and space leader election in population protocols. (English) Zbl 07298235 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 119-129 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{P. Berenbrink} et al., in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 119--129 (2020; Zbl 07298235) Full Text: DOI
Pan, Feng; Liu, Wenchao; Yang, Xiaoyuan; Zhou, Tanping; Tu, Guangsheng Privacy-preserving recommender algorithm based on homomorphic encryption. (Chinese. English summary) Zbl 07295957 J. Zhengzhou Univ., Nat. Sci. Ed. 52, No. 3, 62-67 (2020). MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{F. Pan} et al., J. Zhengzhou Univ., Nat. Sci. Ed. 52, No. 3, 62--67 (2020; Zbl 07295957) Full Text: DOI
Yi, Xingchen; Wei, Hengfeng; Huang, Yu; Qiao, Lei; Lv, Jian TPaxos consensus protocol in PaxosStore: derivation, specification, and refinement. (Chinese. English summary) Zbl 07295743 J. Softw. 31, No. 8, 2336-2361 (2020). MSC: 68M12 68M14 PDF BibTeX XML Cite \textit{X. Yi} et al., J. Softw. 31, No. 8, 2336--2361 (2020; Zbl 07295743) Full Text: DOI
Lin, Can; Chen, Keyu; Cheng, En; Lin, Wen A learning-based ALOHA protocol for underwater acoustic sensor networks. (Chinese. English summary) Zbl 07295301 J. Harbin Eng. Univ. 41, No. 5, 705-711 (2020). MSC: 68M12 PDF BibTeX XML Cite \textit{C. Lin} et al., J. Harbin Eng. Univ. 41, No. 5, 705--711 (2020; Zbl 07295301) Full Text: DOI
Erbatur, Serdar; Marshall, Andrew M.; Ringeissen, Christophe Computing knowledge in equational extensions of subterm convergent theories. (English) Zbl 07283033 Math. Struct. Comput. Sci. 30, No. 6, 683-709 (2020). MSC: 68 PDF BibTeX XML Cite \textit{S. Erbatur} et al., Math. Struct. Comput. Sci. 30, No. 6, 683--709 (2020; Zbl 07283033) Full Text: DOI
van Ditmarsch, Hans; van der Hoek, Wiebe; Kuijer, Louwe B. The logic of gossiping. (English) Zbl 07274568 Artif. Intell. 286, Article ID 103306, 26 p. (2020). MSC: 68T PDF BibTeX XML Cite \textit{H. van Ditmarsch} et al., Artif. Intell. 286, Article ID 103306, 26 p. (2020; Zbl 07274568) Full Text: DOI
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas A formal security analysis of the Signal messaging protocol. (English) Zbl 1453.94133 J. Cryptology 33, No. 4, 1914-1983 (2020). MSC: 94A62 68M12 PDF BibTeX XML Cite \textit{K. Cohn-Gordon} et al., J. Cryptology 33, No. 4, 1914--1983 (2020; Zbl 1453.94133) Full Text: DOI
Murray, Cody D.; Williams, R. Ryan Circuit lower bounds for nondeterministic quasi-polytime from a new easy witness lemma. (English) Zbl 07268367 SIAM J. Comput. 49, No. 5, STOC18-300-STOC18-322 (2020). MSC: 68Q15 68Q17 PDF BibTeX XML Cite \textit{C. D. Murray} and \textit{R. R. Williams}, SIAM J. Comput. 49, No. 5, STOC18--300-STOC18--322 (2020; Zbl 07268367) Full Text: DOI
Yang, Zhijun; Liu, Zheng; Ding, Hongwei; Mao, Lei; Zhang, Qiang Performance analysis of wireless sensor network MAC protocol based on polling control. (Chinese. English summary) Zbl 07267218 J. Yunnan Univ., Nat. Sci. 42, No. 3, 437-443 (2020). MSC: 68M12 PDF BibTeX XML Cite \textit{Z. Yang} et al., J. Yunnan Univ., Nat. Sci. 42, No. 3, 437--443 (2020; Zbl 07267218) Full Text: DOI
Yuan, Yi; Wang, Xingrui; Zhou, Ze; Liu, Zhifu Multi-hop D2D routing protocol for SDN-based wireless network. (Chinese. English summary) Zbl 07267203 J. Xinjiang Univ., Nat. Sci. 37, No. 1, 44-48 (2020). MSC: 68M12 PDF BibTeX XML Cite \textit{Y. Yuan} et al., J. Xinjiang Univ., Nat. Sci. 37, No. 1, 44--48 (2020; Zbl 07267203) Full Text: DOI
Qu, Juan; Li, Yanping An authentication protocol for telecare medicine information system. (Chinese. English summary) Zbl 07267195 J. Wuhan Univ., Nat. Sci. Ed. 66, No. 2, 117-125 (2020). MSC: 68M12 68P25 PDF BibTeX XML Cite \textit{J. Qu} and \textit{Y. Li}, J. Wuhan Univ., Nat. Sci. Ed. 66, No. 2, 117--125 (2020; Zbl 07267195) Full Text: DOI
Wang, Qingwen; Qi, Qian; Cheng, Wei; Li, Dong Node degree estimation and static game forwarding strategy based routing protocol for ad hoc networks. (Chinese. English summary) Zbl 07267143 J. Softw. 31, No. 6, 1802-1816 (2020). MSC: 68M12 PDF BibTeX XML Cite \textit{Q. Wang} et al., J. Softw. 31, No. 6, 1802--1816 (2020; Zbl 07267143) Full Text: DOI
Ji, Ye; Wei, Hengfeng; Huang, Yu; Lv, Jian Specifying and verifying CRDT protocols using TLA+. (Chinese. English summary) Zbl 07267129 J. Softw. 31, No. 5, 1332-1352 (2020). MSC: 68Q60 68M12 PDF BibTeX XML Cite \textit{Y. Ji} et al., J. Softw. 31, No. 5, 1332--1352 (2020; Zbl 07267129) Full Text: DOI
Zhang, Xi; Su, Ye; Qin, Jing Secure multiparty computation protocol of set membership’s judge. (Chinese. English summary) Zbl 07267018 J. Shandong Univ., Nat. Sci. 55, No. 4, 118-126 (2020). MSC: 68M12 68P25 PDF BibTeX XML Cite \textit{X. Zhang} et al., J. Shandong Univ., Nat. Sci. 55, No. 4, 118--126 (2020; Zbl 07267018) Full Text: DOI
Wang, Hongzhi; Qi, Xiaosha; Hu, Huangshui; Wang, Xiaoyu Adaptive backoff algorithm based on MAC layer protocol. (Chinese. English summary) Zbl 07266871 J. Jilin Univ., Sci. 58, No. 2, 349-354 (2020). MSC: 68M10 68M12 94A05 PDF BibTeX XML Cite \textit{H. Wang} et al., J. Jilin Univ., Sci. 58, No. 2, 349--354 (2020; Zbl 07266871) Full Text: DOI
Takashima, Ken; Abe, Yuta; Sasaki, Tatsuya; Miyahara, Daiki; Shinagawa, Kazumasa; Mizuki, Takaaki; Sone, Hideaki Card-based protocols for secure ranking computations. (English) Zbl 07264849 Theor. Comput. Sci. 845, 122-135 (2020). MSC: 68Q10 94A60 PDF BibTeX XML Cite \textit{K. Takashima} et al., Theor. Comput. Sci. 845, 122--135 (2020; Zbl 07264849) Full Text: DOI
Jiao, Junjie; Trentelman, Harry L.; Camlibel, M. Kanat A suboptimality approach to distributed \(\mathcal{H}_2\) control by dynamic output feedback. (English) Zbl 1448.93011 Automatica 121, Article ID 109164, 8 p. (2020). MSC: 93A16 93B52 49J15 PDF BibTeX XML Cite \textit{J. Jiao} et al., Automatica 121, Article ID 109164, 8 p. (2020; Zbl 1448.93011) Full Text: DOI
Bultel, Xavier; Dreier, Jannik; Dumas, Jean-Guillaume; Lafourcade, Pascal A faster cryptographer’s Conspiracy Santa. (English) Zbl 1453.68081 Theor. Comput. Sci. 839, 122-134 (2020). MSC: 68Q10 68P27 68Q17 68Q25 91A12 91A68 94A60 PDF BibTeX XML Cite \textit{X. Bultel} et al., Theor. Comput. Sci. 839, 122--134 (2020; Zbl 1453.68081) Full Text: DOI
Aprile, Manuel; Faenza, Yuri Extended formulations from communication protocols in output-efficient time. (English) Zbl 07241648 Math. Program. 183, No. 1-2 (B), 41-59 (2020). MSC: 94A 90C05 90C27 05C17 05C69 05C85 PDF BibTeX XML Cite \textit{M. Aprile} and \textit{Y. Faenza}, Math. Program. 183, No. 1--2 (B), 41--59 (2020; Zbl 07241648) Full Text: DOI
Han, Zejun; Ding, Hongwei; Bao, Liyong; Yang, Zhijun; Liu, Qianlin Performance analysis of new N-CSMA protocol in wireless ad hoc networks with multi-priority. (Chinese. English summary) Zbl 1449.68008 J. Yunnan Univ., Nat. Sci. 42, No. 1, 43-49 (2020). MSC: 68M12 68M20 PDF BibTeX XML Cite \textit{Z. Han} et al., J. Yunnan Univ., Nat. Sci. 42, No. 1, 43--49 (2020; Zbl 1449.68008) Full Text: DOI
Huang, Qisong; Cao, Zhanmao; Shan, Zhilong Combinatorial routing and scheduling scheme for multiple concurrent flows in wireless mesh networks. (Chinese. English summary) Zbl 1449.68016 J. South China Norm. Univ., Nat. Sci. Ed. 52, No. 1, 122-128 (2020). MSC: 68M20 68M12 PDF BibTeX XML Cite \textit{Q. Huang} et al., J. South China Norm. Univ., Nat. Sci. Ed. 52, No. 1, 122--128 (2020; Zbl 1449.68016) Full Text: DOI
Garay, Juan A.; Kiayias, Aggelos; Panagiotakos, Giorgos Consensus from signatures of work. (English) Zbl 07228746 Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer (ISBN 978-3-030-40185-6/pbk; 978-3-030-40186-3/ebook). Lecture Notes in Computer Science 12006, 319-344 (2020). MSC: 94A62 94A60 91B64 PDF BibTeX XML Cite \textit{J. A. Garay} et al., Lect. Notes Comput. Sci. 12006, 319--344 (2020; Zbl 07228746) Full Text: DOI
Garay, Juan; Kiayias, Aggelos SoK: a consensus taxonomy in the blockchain era. (English) Zbl 07228745 Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer (ISBN 978-3-030-40185-6/pbk; 978-3-030-40186-3/ebook). Lecture Notes in Computer Science 12006, 284-318 (2020). MSC: 94A60 68M14 68P25 91B64 PDF BibTeX XML Cite \textit{J. Garay} and \textit{A. Kiayias}, Lect. Notes Comput. Sci. 12006, 284--318 (2020; Zbl 07228745) Full Text: DOI
Ajish Kumar, K. S.; Rajendraprasad, Deepak; Sudeep, K. S. Oriented diameter of star graphs. (English) Zbl 1453.68117 Changat, Manoj (ed.) et al., Algorithms and discrete applied mathematics. 6th international conference, CALDAM 2020, Hyderabad, India, February 13–15, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12016, 307-317 (2020). MSC: 68R10 05C20 68M10 68M12 68W15 PDF BibTeX XML Cite \textit{K. S. Ajish Kumar} et al., Lect. Notes Comput. Sci. 12016, 307--317 (2020; Zbl 1453.68117) Full Text: DOI
Horváth, Máté; Buttyán, Levente; Székely, Gábor; Neubrandt, Dóra There is always an exception: controlling partial information leakage in secure computation. (English) Zbl 1446.68025 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 133-149 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{M. Horváth} et al., Lect. Notes Comput. Sci. 11975, 133--149 (2020; Zbl 1446.68025) Full Text: DOI
Ding, Derui; Han, Qing-Long; Ge, Xiaohua Distributed filtering of networked dynamic systems with non-Gaussian noises over sensor networks: a survey. (English) Zbl 07217209 Kybernetika 56, No. 1, 5-34 (2020). MSC: 93E11 93C55 93A15 PDF BibTeX XML Cite \textit{D. Ding} et al., Kybernetika 56, No. 1, 5--34 (2020; Zbl 07217209) Full Text: DOI
Ersoy, Oğuzhan; Erkin, Zekeriya; Lagendijk, Reginald L. Decentralized incentive-compatible and Sybil-proof transaction advertisement. (English) Zbl 1446.68020 Pardalos, Panos (ed.) et al., Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6–9, 2019. Cham: Springer. Springer Proc. Bus. Econ., 151-165 (2020). MSC: 68M12 91B03 94A60 PDF BibTeX XML Cite \textit{O. Ersoy} et al., in: Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6--9, 2019. Cham: Springer. 151--165 (2020; Zbl 1446.68020) Full Text: DOI
Selvi, S. Sharmila Deva; Paul, Arinjita; Dirisala, Siva; Basu, Saswata; Rangan, C. Pandu Sharing of encrypted files in blockchain made simpler. (English) Zbl 07215915 Pardalos, Panos (ed.) et al., Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6–9, 2019. Cham: Springer (ISBN 978-3-030-37109-8/hbk; 978-3-030-37110-4/ebook). Springer Proceedings in Business and Economics, 45-60 (2020). MSC: 94A60 68P25 68M12 PDF BibTeX XML Cite \textit{S. S. D. Selvi} et al., in: Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6--9, 2019. Cham: Springer. 45--60 (2020; Zbl 07215915) Full Text: DOI
Khorasani, Faezeh Mazloum; Houshmand, Monireh; Anzabi-Nezhad, Nima S. Authenticated controlled quantum secure direct communication protocol based on five-particle Brown states. (English) Zbl 07213314 Int. J. Theor. Phys. 59, No. 5, 1612-1622 (2020). MSC: 94A62 81P68 94A60 81P94 68M12 PDF BibTeX XML Cite \textit{F. M. Khorasani} et al., Int. J. Theor. Phys. 59, No. 5, 1612--1622 (2020; Zbl 07213314) Full Text: DOI
Jiang, Dong-Huan; Hu, Qin-Zeng; Liang, Xiang-Qian; Xu, Guang-Bao A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states. (English) Zbl 07213298 Int. J. Theor. Phys. 59, No. 5, 1442-1450 (2020). MSC: 94A62 94A60 91B64 68M12 PDF BibTeX XML Cite \textit{D.-H. Jiang} et al., Int. J. Theor. Phys. 59, No. 5, 1442--1450 (2020; Zbl 07213298) Full Text: DOI
Pan, Hong-Ming Semi-quantum dialogue with Bell entangled states. (English) Zbl 07213291 Int. J. Theor. Phys. 59, No. 5, 1364-1371 (2020). MSC: 94A60 81P68 94A62 68M12 PDF BibTeX XML Cite \textit{H.-M. Pan}, Int. J. Theor. Phys. 59, No. 5, 1364--1371 (2020; Zbl 07213291) Full Text: DOI
Liu, Jianping; Jin, Shunfu An imperfect sensing-based channel reservation strategy in CRNs and its performance evaluation. (English) Zbl 07213077 J. Ind. Manag. Optim. 16, No. 3, 1149-1169 (2020). MSC: 68M12 60K25 90B22 68M20 68M10 PDF BibTeX XML Cite \textit{J. Liu} and \textit{S. Jin}, J. Ind. Manag. Optim. 16, No. 3, 1149--1169 (2020; Zbl 07213077) Full Text: DOI
Bunn, Paul; Ostrovsky, Rafail Oblivious sampling with applications to two-party \(k\)-means clustering. (English) Zbl 07211780 J. Cryptology 33, No. 3, 1362-1403 (2020). MSC: 94A60 94A62 94A20 68M14 68P25 68M12 PDF BibTeX XML Cite \textit{P. Bunn} and \textit{R. Ostrovsky}, J. Cryptology 33, No. 3, 1362--1403 (2020; Zbl 07211780) Full Text: DOI
Kiyoshima, Susumu Statistical concurrent non-malleable zero-knowledge from one-way functions. (English) Zbl 07211779 J. Cryptology 33, No. 3, 1318-1361 (2020). MSC: 94A60 94A62 68P25 68M12 PDF BibTeX XML Cite \textit{S. Kiyoshima}, J. Cryptology 33, No. 3, 1318--1361 (2020; Zbl 07211779) Full Text: DOI
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer The communication complexity of private simultaneous messages, revisited. (English) Zbl 07211769 J. Cryptology 33, No. 3, 917-953 (2020). MSC: 94A05 94A15 94A60 94A62 68M12 68P25 PDF BibTeX XML Cite \textit{B. Applebaum} et al., J. Cryptology 33, No. 3, 917--953 (2020; Zbl 07211769) Full Text: DOI
Dinur, Itai; Keller, Nathan; Klein, Ohad An optimal distributed discrete log protocol with applications to homomorphic secret sharing. (English) Zbl 07211766 J. Cryptology 33, No. 3, 824-873 (2020). MSC: 94A60 94A62 68M12 PDF BibTeX XML Cite \textit{I. Dinur} et al., J. Cryptology 33, No. 3, 824--873 (2020; Zbl 07211766) Full Text: DOI
Peterson, Larry; Davie, Bruce Computer networks. 6th edition. (English) Zbl 07190040 The Morgan Kaufmann Series in Networking. Amsterdam: Elsevier (ISBN 978-0-12-818200-0/pbk). 848 p. (2020). MSC: 68-01 68M10 68M11 68M12 PDF BibTeX XML Cite \textit{L. Peterson} and \textit{B. Davie}, Computer networks. 6th edition. Amsterdam: Elsevier (2020; Zbl 07190040)
Pongrácz, András Discordant voting protocols for cyclically linked agents. (English) Zbl 1435.91081 Electron. J. Comb. 27, No. 1, Research Paper P1.58, 14 p. (2020). MSC: 91B12 PDF BibTeX XML Cite \textit{A. Pongrácz}, Electron. J. Comb. 27, No. 1, Research Paper P1.58, 14 p. (2020; Zbl 1435.91081) Full Text: Link
Cruz-Ancona, Christopher D.; Martínez-Guerra, Rafael; Pérez-Pinacho, Claudia A. A leader-following consensus problem of multi-agent systems in heterogeneous networks. (English) Zbl 1436.93127 Automatica 115, Article ID 108899, 11 p. (2020). MSC: 93D50 93A16 93B70 93D20 PDF BibTeX XML Cite \textit{C. D. Cruz-Ancona} et al., Automatica 115, Article ID 108899, 11 p. (2020; Zbl 1436.93127) Full Text: DOI
Mirzaie, Nahal; Faghih, Fathiyeh; Jacobs, Swen; Bonakdarpour, Borzoo Parameterized synthesis of self-stabilizing protocols in symmetric networks. (English) Zbl 1435.68201 Acta Inf. 57, No. 1-2, 271-304 (2020). MSC: 68Q60 68M10 68M12 68M14 68R10 PDF BibTeX XML Cite \textit{N. Mirzaie} et al., Acta Inf. 57, No. 1--2, 271--304 (2020; Zbl 1435.68201) Full Text: DOI
Shneer, Seva; Stolyar, Alexander Stability conditions for a decentralised medium access algorithm: single- and multi-hop networks. (English) Zbl 1431.60117 Queueing Syst. 94, No. 1-2, 109-128 (2020). MSC: 60K25 68M12 PDF BibTeX XML Cite \textit{S. Shneer} and \textit{A. Stolyar}, Queueing Syst. 94, No. 1--2, 109--128 (2020; Zbl 1431.60117) Full Text: DOI
Halldórsson, Magnús M.; Holzer, Stephan; Markatou, Evangelia Anna; Lynch, Nancy Leader election in SINR model with arbitrary power control. (English) Zbl 1437.68024 Theor. Comput. Sci. 811, 21-28 (2020). MSC: 68M14 68M10 68M12 68W15 PDF BibTeX XML Cite \textit{M. M. Halldórsson} et al., Theor. Comput. Sci. 811, 21--28 (2020; Zbl 1437.68024) Full Text: DOI
Daum, Sebastian; Kuhn, Fabian; Maus, Yannic Rumor spreading with bounded in-degree. (English) Zbl 1432.68017 Theor. Comput. Sci. 810, 43-57 (2020). MSC: 68M12 68M10 68R10 PDF BibTeX XML Cite \textit{S. Daum} et al., Theor. Comput. Sci. 810, 43--57 (2020; Zbl 1432.68017) Full Text: DOI
Brandes, Philipp; Kardas, Marcin; Klonowski, Marek; Pająk, Dominik; Wattenhofer, Roger Fast size approximation of a radio network in beeping model. (English) Zbl 1437.68013 Theor. Comput. Sci. 810, 15-25 (2020). MSC: 68M10 68M12 68M14 68W15 68W25 PDF BibTeX XML Cite \textit{P. Brandes} et al., Theor. Comput. Sci. 810, 15--25 (2020; Zbl 1437.68013) Full Text: DOI
Antoniadis, Antonios; Im, Sungjin; Krishnaswamy, Ravishankar; Moseley, Benjamin; Nagarajan, Viswanath; Pruhs, Kirk; Stein, Clifford Hallucination helps: energy efficient virtual circuit routing. (English) Zbl 1448.68178 SIAM J. Comput. 49, No. 1, 37-66 (2020). MSC: 68M20 68M12 68W20 68W25 68W27 PDF BibTeX XML Cite \textit{A. Antoniadis} et al., SIAM J. Comput. 49, No. 1, 37--66 (2020; Zbl 1448.68178) Full Text: DOI
Sudo, Yuichi; Ooshita, Fukuhito; Kakugawa, Hirotsugu; Masuzawa, Toshimitsu; Datta, Ajoy K.; Larmore, Lawrence L. Loosely-stabilizing leader election with polylogarithmic convergence time. (English) Zbl 1436.68039 Theor. Comput. Sci. 806, 617-631 (2020). MSC: 68M12 68M14 68W15 PDF BibTeX XML Cite \textit{Y. Sudo} et al., Theor. Comput. Sci. 806, 617--631 (2020; Zbl 1436.68039) Full Text: DOI
Xu, Chuan; Beauquier, Joffroy; Burman, Janna; Kutten, Shay; Nowak, Thomas Data collection in population protocols with non-uniformly random scheduler. (English) Zbl 1436.68040 Theor. Comput. Sci. 806, 516-530 (2020). MSC: 68M12 68M20 PDF BibTeX XML Cite \textit{C. Xu} et al., Theor. Comput. Sci. 806, 516--530 (2020; Zbl 1436.68040) Full Text: DOI
Ahmadi, Mohamad; Ghodselahi, Abdolhamid; Kuhn, Fabian; Molla, Anisur Rahaman The cost of global broadcast in dynamic radio networks. (English) Zbl 1436.68036 Theor. Comput. Sci. 806, 363-387 (2020). MSC: 68M10 68M12 68W15 PDF BibTeX XML Cite \textit{M. Ahmadi} et al., Theor. Comput. Sci. 806, 363--387 (2020; Zbl 1436.68036) Full Text: DOI
De Bonis, Annalisa; Vaccaro, Ugo A new kind of selectors and their applications to conflict resolution in wireless multichannels networks. (English) Zbl 1436.90032 Theor. Comput. Sci. 806, 219-235 (2020). MSC: 90B18 68M12 68P30 68W20 94B05 PDF BibTeX XML Cite \textit{A. De Bonis} and \textit{U. Vaccaro}, Theor. Comput. Sci. 806, 219--235 (2020; Zbl 1436.90032) Full Text: DOI
Miyahara, Daiki; Hayashi, Yu-ichi; Mizuki, Takaaki; Sone, Hideaki Practical card-based implementations of Yao’s millionaire protocol. (English) Zbl 1436.94084 Theor. Comput. Sci. 803, 207-221 (2020). MSC: 94A60 94C11 PDF BibTeX XML Cite \textit{D. Miyahara} et al., Theor. Comput. Sci. 803, 207--221 (2020; Zbl 1436.94084) Full Text: DOI
Chrétien, Rémy; Cortier, Véronique; Dallon, Antoine; Delaune, Stéphanie Typing messages for free in security protocols. (English) Zbl 1433.68211 ACM Trans. Comput. Log. 21, No. 1, Article No. 1, 52 p. (2020). MSC: 68Q60 68Q85 94A60 PDF BibTeX XML Cite \textit{R. Chrétien} et al., ACM Trans. Comput. Log. 21, No. 1, Article No. 1, 52 p. (2020; Zbl 1433.68211) Full Text: DOI
Boyd, Colin; Mathuria, Anish; Stebila, Douglas Protocols for authentication and key establishment. 2nd revised and enlarged edition. (English) Zbl 1430.68002 Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-58145-2/hbk; 978-3-662-58146-9/ebook). xxviii, 521 p. (2020). MSC: 68-01 68-02 68M12 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{C. Boyd} et al., Protocols for authentication and key establishment. 2nd revised and enlarged edition. Berlin: Springer (2020; Zbl 1430.68002) Full Text: DOI
Younes, Osama S. Modelling and analysis of TCP congestion control mechanisms using stochastic reward nets. (English) Zbl 1453.68023 Int. J. Comput. Sci. Math. 10, No. 4, 390-412 (2019). MSC: 68M12 68M11 68M20 68Q85 PDF BibTeX XML Cite \textit{O. S. Younes}, Int. J. Comput. Sci. Math. 10, No. 4, 390--412 (2019; Zbl 1453.68023) Full Text: DOI
Sudo, Yuichi; Ooshita, Fukuhito; Izumi, Taisuke; Kakugawa, Hirotsugu; Masuzawa, Toshimitsu Logarithmic expected-time leader election in population protocol model. (English) Zbl 07298655 Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6217-7). 60-62 (2019). MSC: 68M14 68W15 PDF BibTeX XML Cite \textit{Y. Sudo} et al., in: Proceedings of the 38th ACM symposium on principles of distributed computing, PODC '19, Toronto, ON, Canada, July 29 -- August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 60--62 (2019; Zbl 07298655) Full Text: DOI
Berenbrink, Petra; Kaaser, Dominik; Radzik, Tomasz On counting the population size. (English) Zbl 07298653 Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6217-7). 43-52 (2019). MSC: 68M14 68W15 PDF BibTeX XML Cite \textit{P. Berenbrink} et al., in: Proceedings of the 38th ACM symposium on principles of distributed computing, PODC '19, Toronto, ON, Canada, July 29 -- August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 43--52 (2019; Zbl 07298653) Full Text: DOI
Doty, David; Eftekhari, Mahsa Efficient size estimation and impossibility of termination in uniform dense population protocols. (English) Zbl 07298652 Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6217-7). 34-42 (2019). MSC: 68M14 68W15 PDF BibTeX XML Cite \textit{D. Doty} and \textit{M. Eftekhari}, in: Proceedings of the 38th ACM symposium on principles of distributed computing, PODC '19, Toronto, ON, Canada, July 29 -- August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 34--42 (2019; Zbl 07298652) Full Text: DOI
Fan, Aili; Li, Junmin; Wei, Chengzhou Bounded synchronization of complex dynamical networks with prescribed performance via event-based transmission strategy. (English) Zbl 1451.93234 Int. J. Adapt. Control Signal Process. 33, No. 11, 1661-1675 (2019). MSC: 93C65 93A15 93B70 PDF BibTeX XML Cite \textit{A. Fan} et al., Int. J. Adapt. Control Signal Process. 33, No. 11, 1661--1675 (2019; Zbl 1451.93234) Full Text: DOI
López, Álvaro G.; Iarosz, Kelly C.; Batista, Antonio M.; Seoane, Jesús M.; Viana, Ricardo L.; Sanjuán, Miguel A. F. The role of dose density in combination cancer chemotherapy. (English) Zbl 07264545 Commun. Nonlinear Sci. Numer. Simul. 79, Article ID 104918, 13 p. (2019). MSC: 92C PDF BibTeX XML Cite \textit{Á. G. López} et al., Commun. Nonlinear Sci. Numer. Simul. 79, Article ID 104918, 13 p. (2019; Zbl 07264545) Full Text: DOI
Zhang, Qikun; Wang, Xianmin; Yuan, Junling; Liu, Lu; Wang, Ruifang; Huang, Hong; Li, Yuanzhang A hierarchical group key agreement protocol using orientable attributes for cloud computing. (English) Zbl 1443.68024 Inf. Sci. 480, 55-69 (2019). MSC: 68M12 68M11 94A60 94A62 PDF BibTeX XML Cite \textit{Q. Zhang} et al., Inf. Sci. 480, 55--69 (2019; Zbl 1443.68024) Full Text: DOI
Jin, Yongxian; Zhu, Hong Multipath routing protocol for wireless sensor networks based on clustering and ant colony. (Chinese. English summary) Zbl 1449.68013 J. Zhejiang Norm. Univ., Nat. Sci. 42, No. 4, 400-406 (2019). MSC: 68M18 68M12 68W50 PDF BibTeX XML Cite \textit{Y. Jin} and \textit{H. Zhu}, J. Zhejiang Norm. Univ., Nat. Sci. 42, No. 4, 400--406 (2019; Zbl 1449.68013) Full Text: DOI
Lai, Yingxu; Liu, Yan; Liu, Jing Trusted connection protocol between networks. (Chinese. English summary) Zbl 1449.68010 J. Softw. 30, No. 12, 3730-3749 (2019). MSC: 68M12 PDF BibTeX XML Cite \textit{Y. Lai} et al., J. Softw. 30, No. 12, 3730--3749 (2019; Zbl 1449.68010) Full Text: DOI
Gong, Linming; Li, Shundong; Dou, Jiawei; Wang, Daoshun Private social-willing detection. (Chinese. English summary) Zbl 1449.68030 J. Softw. 30, No. 11, 3535-3548 (2019). MSC: 68P25 68M12 68P27 PDF BibTeX XML Cite \textit{L. Gong} et al., J. Softw. 30, No. 11, 3535--3548 (2019; Zbl 1449.68030) Full Text: DOI
Dong, Han; Cheng, Shan; Zhang, Dongmei Consensus of multi-agent systems without velocity input. (Chinese. English summary) Zbl 1449.68111 Control Theory Appl. 36, No. 10, 1599-1605 (2019). MSC: 68T42 68M12 93A16 PDF BibTeX XML Cite \textit{H. Dong} et al., Control Theory Appl. 36, No. 10, 1599--1605 (2019; Zbl 1449.68111) Full Text: DOI
Nemitz, Catherine E.; Amert, Tanya; Anderson, James H. Real-time multiprocessor locks with nesting: optimizing the common case. (English) Zbl 1436.68068 Real-Time Syst. 55, No. 2, 296-348 (2019). MSC: 68M20 PDF BibTeX XML Cite \textit{C. E. Nemitz} et al., Real-Time Syst. 55, No. 2, 296--348 (2019; Zbl 1436.68068) Full Text: DOI
Wijaya, Dimaz Ankaa; Liu, Joseph K.; Steinfeld, Ron; Liu, Dongxi Risk of asynchronous protocol update: attacks to Monero protocols. (English) Zbl 07205576 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21547-7/pbk; 978-3-030-21548-4/ebook). Lecture Notes in Computer Science 11547, 307-321 (2019). MSC: 94A60 68M12 91B64 PDF BibTeX XML Cite \textit{D. A. Wijaya} et al., Lect. Notes Comput. Sci. 11547, 307--321 (2019; Zbl 07205576) Full Text: DOI
Tang, Shuyang; Chow, Sherman S. M.; Liu, Zhiqiang; Liu, Joseph K. Fast-to-finalize Nakamoto-like consensus. (English) Zbl 07205574 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21547-7/pbk; 978-3-030-21548-4/ebook). Lecture Notes in Computer Science 11547, 271-288 (2019). MSC: 94A60 68M12 91B64 PDF BibTeX XML Cite \textit{S. Tang} et al., Lect. Notes Comput. Sci. 11547, 271--288 (2019; Zbl 07205574) Full Text: DOI
Patra, Arpita; Ravi, Divya Beyond honest majority: the round complexity of fair and robust multi-party computation. (English) Zbl 07202421 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-34577-8/pbk; 978-3-030-34578-5/ebook). Lecture Notes in Computer Science 11921, 456-487 (2019). MSC: 94A60 68M14 68M12 PDF BibTeX XML Cite \textit{A. Patra} and \textit{D. Ravi}, Lect. Notes Comput. Sci. 11921, 456--487 (2019; Zbl 07202421) Full Text: DOI
Garg, Sanjam; Goel, Aarushi; Jain, Abhishek The broadcast message complexity of secure multiparty computation. (English) Zbl 07202420 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-34577-8/pbk; 978-3-030-34578-5/ebook). Lecture Notes in Computer Science 11921, 426-455 (2019). MSC: 94A60 94A05 68M14 68M12 PDF BibTeX XML Cite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11921, 426--455 (2019; Zbl 07202420) Full Text: DOI
Takashima, Ken; Abe, Yuta; Sasaki, Tatsuya; Miyahara, Daiki; Shinagawa, Kazumasa; Mizuki, Takaaki; Sone, Hideaki Card-based secure ranking computations. (English) Zbl 07200318 Li, Yingshu (ed.) et al., Combinatorial optimization and applications. 13th international conference, COCOA 2019, Xiamen, China, December 13–15, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-36411-3/pbk; 978-3-030-36412-0/ebook). Lecture Notes in Computer Science 11949, 461-472 (2019). MSC: 68M 94A60 PDF BibTeX XML Cite \textit{K. Takashima} et al., Lect. Notes Comput. Sci. 11949, 461--472 (2019; Zbl 07200318) Full Text: DOI
Boyd, Colin; Gjøsteen, Kristian; Gritti, Clémentine; Haines, Thomas A blind coupon mechanism enabling veto voting over unreliable networks. (English) Zbl 1453.68024 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 250-270 (2019). MSC: 68M25 68M12 94A60 PDF BibTeX XML Cite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 11898, 250--270 (2019; Zbl 1453.68024) Full Text: DOI
Pillai, Sibi Raj B.; Prabhakaran, Manoj; Prabhakaran, Vinod M.; Sridhar, Srivatsan Optimality of a protocol by Feige-Kilian-Naor for three-party secure computation. (English) Zbl 07199462 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-35422-0/pbk; 978-3-030-35423-7/ebook). Lecture Notes in Computer Science 11898, 216-226 (2019). MSC: 94A60 94A05 68M12 68P30 PDF BibTeX XML Cite \textit{S. R. B. Pillai} et al., Lect. Notes Comput. Sci. 11898, 216--226 (2019; Zbl 07199462) Full Text: DOI
Smart, Nigel P.; Talibi Alaoui, Younes Distributing any elliptic curve based protocol. (English) Zbl 07197476 Albrecht, Martin (ed.), Cryptography and coding. 17th IMA international conference, IMACC 2019, Oxford, UK, December 16–18, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-35198-4/pbk; 978-3-030-35199-1/ebook). Lecture Notes in Computer Science 11929, 342-366 (2019). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{N. P. Smart} and \textit{Y. Talibi Alaoui}, Lect. Notes Comput. Sci. 11929, 342--366 (2019; Zbl 07197476) Full Text: DOI
Canard, Sébastien; Ferreira, Loïc Extended 3-party ACCE and application to LoRaWAN 1.1. (English) Zbl 07197439 Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-23695-3/pbk; 978-3-030-23696-0/ebook). Lecture Notes in Computer Science 11627, 21-38 (2019). MSC: 94A60 68M11 68M12 PDF BibTeX XML Cite \textit{S. Canard} and \textit{L. Ferreira}, Lect. Notes Comput. Sci. 11627, 21--38 (2019; Zbl 07197439) Full Text: DOI
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Dowsley, Rafael; Giacomelli, Irene Efficient UC commitment extension with homomorphism for free (and applications). (English) Zbl 07196576 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-34620-1/pbk; 978-3-030-34621-8/ebook). Lecture Notes in Computer Science 11922, 606-635 (2019). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{I. Cascudo} et al., Lect. Notes Comput. Sci. 11922, 606--635 (2019; Zbl 07196576) Full Text: DOI
Kushilevitz, Eyal; Ostrovsky, Rafail; Prouff, Emmanuel; Rosén, Adi; Thillard, Adrian; Vergnaud, Damien Lower and upper bounds on the randomness complexity of private computations of AND. (English) Zbl 07195448 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-36032-0/pbk; 978-3-030-36033-7/ebook). Lecture Notes in Computer Science 11892, 386-406 (2019). MSC: 94A60 68M14 PDF BibTeX XML Cite \textit{E. Kushilevitz} et al., Lect. Notes Comput. Sci. 11892, 386--406 (2019; Zbl 07195448) Full Text: DOI
Alon, Bar; Paskin-Cherniavsky, Anat On perfectly secure 2PC in the OT-hybrid model. (English) Zbl 07195433 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-36029-0/pbk; 978-3-030-36030-6/ebook). Lecture Notes in Computer Science 11891, 561-595 (2019). MSC: 94A60 68M12 68M14 PDF BibTeX XML Cite \textit{B. Alon} and \textit{A. Paskin-Cherniavsky}, Lect. Notes Comput. Sci. 11891, 561--595 (2019; Zbl 07195433) Full Text: DOI
Haitner, Iftach; Mazor, Noam; Shaltiel, Ronen; Silbak, Jad Channels of small log-ratio leakage and characterization of two-party differentially private computation. (English) Zbl 07195432 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-36029-0/pbk; 978-3-030-36030-6/ebook). Lecture Notes in Computer Science 11891, 531-560 (2019). MSC: 94A60 94A40 68P25 68M12 PDF BibTeX XML Cite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 11891, 531--560 (2019; Zbl 07195432) Full Text: DOI
Cortier, Véronique; Gaudry, Pierrick; Glondu, Stéphane Belenios: a simple private and verifiable electronic voting system. (English) Zbl 07176730 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 214-238 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{V. Cortier} et al., Lect. Notes Comput. Sci. 11565, 214--238 (2019; Zbl 07176730) Full Text: DOI
Alturki, Musab A.; Ban Kirigin, Tajana; Kanovich, Max; Nigam, Vivek; Scedrov, Andre; Talcott, Carolyn A multiset rewriting model for specifying and verifying timing aspects of security protocols. (English) Zbl 07176729 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 192-213 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{M. A. Alturki} et al., Lect. Notes Comput. Sci. 11565, 192--213 (2019; Zbl 07176729) Full Text: DOI
Castiglione, Jason; Pavlovic, Dusko; Seidel, Peter-Michael Privacy protocols. (English) Zbl 07176728 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 167-191 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{J. Castiglione} et al., Lect. Notes Comput. Sci. 11565, 167--191 (2019; Zbl 07176728) Full Text: DOI
Roscoe, Andrew William; Wang, Lei Key agreement via protocols. (English) Zbl 07176727 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 156-166 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{A. W. Roscoe} and \textit{L. Wang}, Lect. Notes Comput. Sci. 11565, 156--166 (2019; Zbl 07176727) Full Text: DOI
Liskov, Moses D.; Guttman, Joshua D.; Ramsdell, John D.; Rowe, Paul D.; Thayer, F. Javier Enrich-by-need protocol analysis for Diffie-Hellman. (English) Zbl 07176726 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 135-155 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{M. D. Liskov} et al., Lect. Notes Comput. Sci. 11565, 135--155 (2019; Zbl 07176726) Full Text: DOI
Basin, David; Hirschi, Lucca; Sasse, Ralf Symbolic analysis of identity-based protocols. (English) Zbl 07176725 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 112-134 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{D. Basin} et al., Lect. Notes Comput. Sci. 11565, 112--134 (2019; Zbl 07176725) Full Text: DOI
Nigam, Vivek; Talcott, Carolyn; Urquiza, Abraão Aires Symbolic timed trace equivalence. (English) Zbl 07176724 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 89-111 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{V. Nigam} et al., Lect. Notes Comput. Sci. 11565, 89--111 (2019; Zbl 07176724) Full Text: DOI
Kozyri, Elisavet; Arden, Owen; Myers, Andrew C.; Schneider, Fred B. JRIF: reactive information flow control for Java. (English) Zbl 07176723 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 70-88 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{E. Kozyri} et al., Lect. Notes Comput. Sci. 11565, 70--88 (2019; Zbl 07176723) Full Text: DOI
Busi, Matteo; Degano, Pierpaolo; Galletta, Letterio Robust declassification by incremental typing. (English) Zbl 07176722 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 54-69 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{M. Busi} et al., Lect. Notes Comput. Sci. 11565, 54--69 (2019; Zbl 07176722) Full Text: DOI
Pavlovic, Dusko (ed.); Hanna, Erin; Lynch, Christopher; Myers, David Jaz; Richardson, Corey Finding intruder knowledge with cap-matching. (English) Zbl 07176721 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 39-53 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{D. Pavlovic} (ed.) et al., Lect. Notes Comput. Sci. 11565, 39--53 (2019; Zbl 07176721) Full Text: DOI
Escobar, Santiago; Meseguer, José Canonical narrowing with irreducibility constraints as a symbolic protocol analysis method. (English) Zbl 07176720 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 15-38 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{S. Escobar} and \textit{J. Meseguer}, Lect. Notes Comput. Sci. 11565, 15--38 (2019; Zbl 07176720) Full Text: DOI
Syverson, Paul Key reminiscences. (English) Zbl 07176719 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 8-14 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{P. Syverson}, Lect. Notes Comput. Sci. 11565, 8--14 (2019; Zbl 07176719) Full Text: DOI
Millen, Jon A long, slow conversation. (English) Zbl 07176718 Guttman, Joshua D. (ed.) et al., Foundations of security, protocols, and equational reasoning. Essays dedicated to Catherine A. Meadows. Cham: Springer (ISBN 978-3-030-19051-4/pbk; 978-3-030-19052-1/ebook). Lecture Notes in Computer Science 11565, 6-7 (2019). MSC: 68M12 68P25 94A60 PDF BibTeX XML Cite \textit{J. Millen}, Lect. Notes Comput. Sci. 11565, 6--7 (2019; Zbl 07176718) Full Text: DOI