Sciweavers

3504 search results - page 54 / 701
» Secure protocol composition
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
CCS
2006
ACM
15 years 1 months ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...
CCS
2010
ACM
14 years 10 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
WISA
2010
Springer
14 years 7 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
ATAL
2003
Springer
15 years 3 months ago
A formal compositional model of multiagent interaction
Interaction protocols for multiagent systems have been described diagrammatically in an extension of UML called AUML (Agent UML). In this paper, we show how to translate these pro...
Sea Ling, Seng Wai Loke