Sciweavers

1612 search results - page 42 / 323
» About models of security protocols
Sort
View
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
14 years 7 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
ATAL
2005
Springer
15 years 3 months ago
An integrated framework for adaptive reasoning about conversation patterns
We present an integrated approach for reasoning about and learning conversation patterns in multiagent communication. The approach is based on the assumption that information abou...
Michael Rovatsos, Felix A. Fischer, Gerhard Wei&sz...
AAAI
2007
15 years 4 days ago
Representing and Reasoning about Commitments in Business Processes
A variety of business relationships in open settings can be understood in terms of the creation and manipulation of commitments among the participants. These include B2C and B2B c...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
15 years 1 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...