Sciweavers

1777 search results - page 124 / 356
» Programming Cryptographic Protocols
Sort
View
TITB
2010
181views Education» more  TITB 2010»
14 years 8 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
IACR
2011
101views more  IACR 2011»
14 years 27 days ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
APLAS
2004
ACM
15 years 6 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann
ICSE
1992
IEEE-ACM
15 years 5 months ago
A Toolbox for the Verification of LOTOS Programs
This paper presents the tools Ald
Jean-Claude Fernandez, Hubert Garavel, Laurent Mou...
ECOOP
1995
Springer
15 years 4 months ago
Interface-Based Protocol Specification of Open Systems using PSL
PSL is a framework for describing dynamic and architectural properties of open systems. PSL extends established interface-based tactics for describing the functional properties of...
Doug Lea, Jos Marlowe