Sciweavers

3504 search results - page 29 / 701
» Secure protocol composition
Sort
View
68
Voted
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
14 years 9 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...
ACSC
2008
IEEE
15 years 4 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
264
Voted
IJNSEC
2008
118views more  IJNSEC 2008»
14 years 9 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
PODC
1995
ACM
15 years 1 months ago
A Framework for Protocol Composition in Horus
The Horus system supports a communication architecture ats protocols as instances of an abstract data type. This approach encourages developers to partition complex protocols into...
Robbert van Renesse, Kenneth P. Birman, Roy Friedm...
68
Voted
AAAI
2007
14 years 12 months ago
A Modular Action Description Language for Protocol Composition
Protocols are modular abstractions that capture patterns of interaction among agents. The compelling vision behind protocols is to enable creating customized interactions by refi...
Nirmit Desai, Munindar P. Singh