Sciweavers

671 search results - page 56 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
IWNAS
2008
IEEE
15 years 7 months ago
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
With the increased popularity of replica-based services in distributed systems such as the Grid, consistency control among replicas becomes more and more important. To this end, I...
Yijun Lu, Xueming Li, Hong Jiang
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
ICWS
2010
IEEE
15 years 2 months ago
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition
This paper presents a methodology and a set of tools for the modelling, validation and testing of Web service composition, conceived and developed within the French national projec...
Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, El...
COMPSAC
2006
IEEE
15 years 7 months ago
A Practical Approach for Automated Test Case Generation using Statecharts
This paper presents an approach for automated test case generation using a software specification modeled in Statecharts. The steps defined in such approach involve: translation o...
Valdivino A. Santiago, Ana Silvia Martins do Amara...