Sciweavers

3504 search results - page 474 / 701
» Secure protocol composition
Sort
View
151
Voted
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
15 years 5 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
ICISC
2009
169views Cryptology» more  ICISC 2009»
14 years 11 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
130
Voted
CCS
2011
ACM
14 years 1 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ICSOC
2009
Springer
15 years 8 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...
113
Voted
CAISE
2005
Springer
15 years 7 months ago
Developing Adapters for Web Services Integration
The push toward business process automation has generated the need for integrating different enterprise applications involved in such processes. The typical approach to integration...
Boualem Benatallah, Fabio Casati, Daniela Grigori,...