Sciweavers

3504 search results - page 40 / 701
» Secure protocol composition
Sort
View
CONCUR
2003
Springer
15 years 2 months ago
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus
We describe a probabilistic polynomial-time process calculus for analyzing cryptographic protocols and use it to derive compositionality properties of protocols in the presence of ...
Paulo Mateus, John C. Mitchell, Andre Scedrov
ESORICS
2009
Springer
15 years 10 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
SRDS
2003
IEEE
15 years 3 months ago
Appia vs. Cactus: Comparing Protocol Composition Frameworks
The paper presents and compares Appia and Cactus, two frameworks for protocol composition. The comparison is based on the experience gained in implementing a faulttolerant Atomic ...
Sergio Mena, Xavier Cuvellier, Christophe Gr&eacut...
ENTCS
2002
78views more  ENTCS 2002»
14 years 9 months ago
Separating concerns in a high-level component-based context
Building on the work of architectural description languages and aspect-oriented programming, we try to improve current visual component composition environments. In our , we intro...
Wim Vanderperren, Bart Wydaeghe
IAT
2006
IEEE
15 years 3 months ago
Dynamic Service Composition and Selection through an Agent Interaction Protocol
This paper addresses the dynamic service selection and composition issues for the satisfaction of user requirements. We propose an approach in which agents perform service composi...
Yasmine Charif-Djebbar, Nicolas Sabouret