Sciweavers

256 search results - page 29 / 52
» Reusing Static Keys in Key Agreement Protocols
Sort
View
IAT
2007
IEEE
15 years 8 months ago
A Multi-Phase Protocol for Negotiation with Interdependent Issues
— Multi-issue negotiations are a central component of many important coordination challenges. Almost all previous work in this area has assumed that negotiation issues are indepe...
Hiromitsu Hattori, Mark Klein, Takayuki Ito
108
Voted
ENTCS
2006
103views more  ENTCS 2006»
15 years 1 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
CSFW
2003
IEEE
15 years 7 months ago
Automatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. W...
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, ...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
WWW
2006
ACM
16 years 2 months ago
Semantic WS-agreement partner selection
In a dynamic service oriented environment it is desirable for service consumers and providers to offer and obtain guarantees regarding their capabilities and requirements. WS-Agre...
Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad...