Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Gergei Bana"'
Autor:
Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter B. Rønne, Gergei Bana, David Naccache, Peter Y. A. Ryan, Marco Biroli, Megi Dervishi, Hugo Waltsburger
Publikováno v:
Lecture Notes in Computer Science
International Joint Conference on Electronic Voting 2022
International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩
Electronic Voting ISBN: 9783031159107
International Joint Conference on Electronic Voting 2022
International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩
Electronic Voting ISBN: 9783031159107
The open vote network ( [10]) is a secure two-round multi-party protocol facilitating the computation of a sum of integer votes without revealing their individual values. This is done without a central authority trusted for privacy, and thus allows d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e3d3be7823dd1f04c9ba16f850f034d7
https://cnrs.hal.science/hal-03913581
https://cnrs.hal.science/hal-03913581
Publikováno v:
ACM Transactions on Computational Logic. 21:1-44
In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attac
Autor:
Gergei Bana, Mitsuhiro Okada
Publikováno v:
New Frontiers in Artificial Intelligence ISBN: 9783030799410
JSAI-isAI Workshops
JSAI-isAI Workshops
We present a new semantics for first-order conditional logic, which is a generalization of that of Friedman, Halpern and Koller [7]. We utilize Fitting’s embedding of first-order classical logic in first-order S4 to define our semantics. We explain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::204e7cf355ef011509a68b2d914b22d8
https://doi.org/10.1007/978-3-030-79942-7_1
https://doi.org/10.1007/978-3-030-79942-7_1
Autor:
Gergei Bana
Publikováno v:
Philosophy of Science. 83:988-1001
Redei and Gyenis (2013) suggest that Lewis’s Principal Principle is meaningful only if it satisfies certain consistency conditions: starting from any assignment of subjective probabilities (credences) to some algebra of events, we should always be
Autor:
Gergei Bana
Publikováno v:
European Studies in Philosophy of Science ISBN: 9783319554853
In his seminal work, A Subjectivist’s Guide to Objective Chance, David Lewis considered the possibility for a subjectivist to accept the existence of objective chance, and argued how this acceptance would affect the subjectivist’s degrees of beli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0f210a3adc2fefb95c75e8812e235577
https://doi.org/10.1007/978-3-319-55486-0_3
https://doi.org/10.1007/978-3-319-55486-0_3
Publikováno v:
Journal of Computer Security. 17:737-797
In their seminal work, Abadi and Rogaway show that the formal (Dolev-Yao) notion of indistinguishability is sound with respect to the computational model: messages that are indistinguishable in the formal model become indistinguishable messages in th
Autor:
Gergei Bana
Publikováno v:
Expositiones Mathematicae. 25(1):83-93
In this paper we show that if a not-necessarily-self-financing portfolio has instantaneously riskless internal gains, then on an infinitesimal time-interval, the increase in the internal gains on the portfolio is the same as the change in the price o
Autor:
Gergei Bana, Hubert Comon-Lundh
Publikováno v:
2014 ACM SIGSAC Conference on Computer and Communications Security
2014 ACM SIGSAC Conference on Computer and Communications Security, Nov 2014, Scottsdale, United States. pp.609-620, ⟨10.1145/2660267.2660276⟩
ACM Conference on Computer and Communications Security
2014 ACM SIGSAC Conference on Computer and Communications Security, Nov 2014, Scottsdale, United States. pp.609-620, ⟨10.1145/2660267.2660276⟩
ACM Conference on Computer and Communications Security
International audience; We consider the problem of computational indistinguishability of protocols. We design a symbolic model, amenable to automated deduction, such that a successful inconsistency proof implies computational indistinguishability. Co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ea6af04de61299a4bd49c2a9ee2995b1
https://inria.hal.science/hal-01102216
https://inria.hal.science/hal-01102216
Publikováno v:
CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
CCS 2013-20th ACM Conference on Computer and Communications Security
CCS 2013-20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. pp.1231-1246, ⟨10.1145/2508859.2516710⟩
ACM Conference on Computer and Communications Security
CCS 2013-20th ACM Conference on Computer and Communications Security
CCS 2013-20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. pp.1231-1246, ⟨10.1145/2508859.2516710⟩
ACM Conference on Computer and Communications Security
International audience; Recently, Bana and Comon-Lundh introduced the notion of computationally complete symbolic attacker to deliver unconditional computational soundness to symbolic protocol verification. First we explain the relationship between t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5ec1873b22a23a18f1e8bb39c5f0897b
https://hal.inria.fr/hal-00918848
https://hal.inria.fr/hal-00918848
Autor:
Gergei Bana, Hubert Comon-Lundh
Publikováno v:
2nd Conference on Principles of Security and Trust (POST 2012)
2nd Conference on Principles of Security and Trust (POST 2012), 2012, Unknown, pp.189-208
Lecture Notes in Computer Science ISBN: 9783642286407
POST
2nd Conference on Principles of Security and Trust (POST 2012), 2012, Unknown, pp.189-208
Lecture Notes in Computer Science ISBN: 9783642286407
POST
International audience; We consider the question of the adequacy of symbolic models versus computational models for the verification of security protocols. We neither try to include properties in the symbolic model that reflect the properties of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::663f23082dd098264edf5511187186de
https://hal.inria.fr/hal-00863380
https://hal.inria.fr/hal-00863380