Sciweavers

10666 search results - page 1827 / 2134
» Quantum programming languages
Sort
View
122
Voted
IFIP
2004
Springer
15 years 10 months ago
ATV: An Efficient Method for Constructing a Certification Path
: Constructing a certification path is the mainly method of validating a certificate at given time. The established path will consist of all the valid certificates that reside betw...
Omar Batarfi
IFIP
2004
Springer
15 years 10 months ago
The MOMIS methodology for integrating heterogeneous data sources
: The Mediator EnvirOnment for Multiple Information Sources (MOMIS) aims at constructing synthesized, integrated descriptions of the information coming from multiple heterogeneous ...
Domenico Beneventano, Sonia Bergamaschi
127
Voted
IFIP
2004
Springer
15 years 10 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
IFIP
2004
Springer
15 years 10 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
IFIP
2004
Springer
15 years 10 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
« Prev « First page 1827 / 2134 Last » Next »