Sciweavers

1834 search results - page 204 / 367
» Public Key Cryptography
Sort
View
FSTTCS
2007
Springer
15 years 10 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
IMECS
2007
15 years 5 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
IJFCS
2007
93views more  IJFCS 2007»
15 years 4 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
MMMACNS
2010
Springer
15 years 2 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
HICSS
2006
IEEE
150views Biometrics» more  HICSS 2006»
15 years 10 months ago
E-Government Evaluation: Reflections on Two Organisational Studies
Senior executives in public sector organisations have been charged with delivering an e-Government agenda. A key emerging area of research is that of the evaluation of e-Governmen...
Stephen Jones, Zahir Irani, Amir M. Sharif, Marino...