Sciweavers

403 search results - page 26 / 81
» An algebra for commitment protocols
Sort
View
ATAL
2005
Springer
15 years 5 months ago
Reliable group communication and institutional action in a multi-agent trading scenario
This paper proposes the use of reliable group communication as a complement to traditional asynchronous messaging in multi-agent systems. In particular, the mechanism of message p...
Stephen Cranefield
ICDCSW
2000
IEEE
15 years 4 months ago
Games-Based Model Checking of Protocols: counting doesn't count
We introduce a technique that can be used to model the behaviour of protocols. In our model each process within a protocol belongs to a particular class. A set of rules governs th...
Tim Kempster, Colin Stirling, Peter Thanisch
CCR
1999
92views more  CCR 1999»
14 years 11 months ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
IPPS
2008
IEEE
15 years 6 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
JCS
2006
157views more  JCS 2006»
14 years 11 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov