Cryptology ePrint Archive: Report 2007/406
Available versions in chronological order
20071026:085825 (posted 26-Oct-2007 08:58:25 UTC)
How to Model Bounded Computation in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: Updated version
20080228:163512 (posted 28-Feb-2008 16:35:12 UTC)
Modeling Bounded Computation in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: Updated version
20080229:144130 (posted 29-Feb-2008 14:41:30 UTC)
Modeling Bounded Computation in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: Updated version
20080414:215120 (posted 14-Apr-2008 21:51:20 UTC)
Modeling Bounded Computation in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: Updated version
20080626:081212 (posted 26-Jun-2008 08:12:12 UTC)
Modeling Computational Security in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: An abstract of this paper will appear at CONCUR 08.
20080626:083003 (posted 26-Jun-2008 08:30:03 UTC)
Modeling Computational Security in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
Publication Info: An abstract of this paper will appear at CONCUR 08.
[
Cryptology ePrint archive
]