Sciweavers

3504 search results - page 41 / 701
» Secure protocol composition
Sort
View
EUROCRYPT
1999
Springer
15 years 1 months ago
On the Concurrent Composition of Zero-Knowledge Proofs
We examine the concurrent composition of zero-knowledge proofs. By concurrent composition, we indicate a single prover that is involved in multiple, simultaneous zero-knowledge pro...
Ransom Richardson, Joe Kilian
JLP
2007
159views more  JLP 2007»
14 years 9 months ago
Reasoning about interaction protocols for customizing web service selection and composition
This work faces the problem of web service selection and composition, discussing the advantages that derive from the inclusion, in a web service declarative description, of the hi...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
158
Voted
POPL
2002
ACM
15 years 10 months ago
Analyzing security protocols with secrecy types and logic programs
Bruno Blanchet, Martín Abadi
ICDCSW
2000
IEEE
15 years 1 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
PERCOM
2010
ACM
14 years 8 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright