Sciweavers

620 search results - page 49 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
EUROMICRO
2003
IEEE
15 years 3 months ago
Towards A Classification Model for Component-Based Software Engineering Research
Accurate and timely information is a key motivator in the widespread adoption of CBSE technology in Europe. Although there are overlaps and informal communications between researc...
Gerald Kotonya, Ian Sommerville, Steve Hall
MFCS
1990
Springer
15 years 1 months ago
One-Way Functions in Complexity Theory
We introduce the notion of associative one-way functions and prove that they exist if and only if P 6= NP. As evidence of their utility, we present two novel protocols that apply ...
Alan L. Selman
ICIW
2007
IEEE
14 years 10 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
CCS
2005
ACM
15 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ATAL
2007
Springer
15 years 4 months ago
Semantical Concepts for a Formal Structural Dynamics of Situated Multiagent Systems
Abstract. This paper introduces semantical concepts to support a formal structural dynamics of situated multiagent systems. Multiagent systems are seen from the perspective of the ...
Antônio Carlos da Rocha Costa, Graçal...