Sciweavers

3504 search results - page 141 / 701
» Secure protocol composition
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Pervasive Service Composition in the Home Network
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
André Bottaro, Anne Gérodolle, Phili...
143
Voted
TES
2004
Springer
15 years 10 months ago
From Web Service Composition to Megaprogramming
Abstract. With the emergence of Web service technologies, it has become possible to use high level megaprogramming models and visual tools to easily build distributed systems using...
Cesare Pautasso, Gustavo Alonso
131
Voted
MOBIHOC
2006
ACM
16 years 4 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
130
Voted
ICFEM
2009
Springer
15 years 2 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang
ACISP
2007
Springer
15 years 9 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...