Sciweavers

3504 search results - page 22 / 701
» Secure protocol composition
Sort
View
CSFW
2005
IEEE
15 years 3 months ago
Enforcing Secure Service Composition
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IEEESP
2011
14 years 1 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
CSFW
1996
IEEE
15 years 1 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
NSPW
2004
ACM
15 years 3 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
IWSEC
2010
Springer
14 years 7 months ago
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party prot...
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamo...