Sciweavers

3504 search results - page 22 / 701
» Secure protocol composition
Sort
View
CSFW
2005
IEEE
15 years 7 months ago
Enforcing Secure Service Composition
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IEEESP
2011
14 years 5 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
CSFW
1996
IEEE
15 years 6 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
NSPW
2004
ACM
15 years 7 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
IWSEC
2010
Springer
14 years 12 months ago
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party prot...
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamo...