Sciweavers

99 search results - page 11 / 20
» A XML format secure protocol - OpenSST
Sort
View
CSFW
2005
IEEE
15 years 5 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ITRUST
2004
Springer
15 years 5 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
BMCBI
2008
99views more  BMCBI 2008»
14 years 11 months ago
CWRML: representing crop wild relative conservation and use data in XML
Background: Crop wild relatives are wild species that are closely related to crops. They are valuable as potential gene donors for crop improvement and may help to ensure food sec...
Jonathan D. Moore, Shelagh P. Kell, Jose M. Iriond...
AGENTS
2000
Springer
15 years 4 months ago
Customer coalitions in the electronic marketplace
1 In the last few years, the electronic marketplace has witnessed an exponential growth in worth and size, and projections are for this trend to intensify in coming years. Yet, th...
Maksim Tsvetovat, Katia P. Sycara
APLAS
2010
ACM
14 years 12 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...