Sciweavers

3504 search results - page 408 / 701
» Secure protocol composition
Sort
View
130
Voted
PODC
2004
ACM
15 years 8 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
103
Voted
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
15 years 8 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...
102
Voted
COMPSAC
2002
IEEE
15 years 7 months ago
Component Based System Framework for Dynamic B2B Interaction
Business-to-Business (B2B) collaboration is becoming a pivotal way to bring today’s enterprises to success in the dynamically changing e-business environment. Though many busine...
Jinmin Hu, Paul W. P. J. Grefen
124
Voted
CAV
2012
Springer
223views Hardware» more  CAV 2012»
13 years 5 months ago
Detecting Fair Non-termination in Multithreaded Programs
Abstract. We develop compositional analysis algorithms for detecting nontermination in multithreaded programs. Our analysis explores fair and ultimatelyperiodic executions—i.e., ...
Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi...
135
Voted
GCC
2003
Springer
15 years 7 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou