Sciweavers

1180 search results - page 71 / 236
» Interaction Protocols in Agentis
Sort
View
113
Voted
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 7 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
ICNS
2007
IEEE
15 years 7 months ago
A Routing Based Service Discovery Protocol for Ad hoc Networks
: Ad hoc networks are networks that consist of wireless mobile nodes. They are networks that do not require any preestablished infrastructure. Their ability to quickly and dynamica...
Abdel Obaid, Azeddine Khir, Hafedh Mili
DAGSTUHL
2004
15 years 2 months ago
Audition of Web Services for Testing Conformance to Open Specified Protocols
Abstract. A Web Service (WS) is a type of component specifically conceived for distributed machine-to-machine interaction. Interoperability between WSs involves both data and messa...
Antonia Bertolino, Lars Frantzen, Andrea Polini, J...
105
Voted
DBSEC
2000
94views Database» more  DBSEC 2000»
15 years 1 months ago
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
In this paper, we present a fair-exchange electronic commerce (e-commerce) protocol, based on using an online trusted third party, that ensures fairness and prevents any party fro...
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamu...
83
Voted
TES
2004
Springer
15 years 6 months ago
Robust Web Services via Interaction Contracts
Web services represent the latest effort of the information technology industry to provide a framework for cross enterprise automation. One principal characteristic of this framewo...
David B. Lomet