Sciweavers

3504 search results - page 35 / 701
» Secure protocol composition
Sort
View
CSFW
2003
IEEE
15 years 3 months ago
A Derivation System for Security Protocols and its Logical Formalization
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
SPW
1999
Springer
15 years 1 months ago
Trust Management and Network Layer Security Protocols
Matt Blaze, John Ioannidis, Angelos D. Keromytis
CSFW
2006
IEEE
15 years 1 months ago
Verified Interoperable Implementations of Security Protocols
Karthikeyan Bhargavan, Cédric Fournet, Andr...
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
EUROMICRO
2009
IEEE
15 years 1 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...