Sciweavers

3504 search results - page 74 / 701
» Secure protocol composition
Sort
View
COMPSAC
2011
IEEE
14 years 2 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
113
Voted
TES
2005
Springer
15 years 8 months ago
Systematic Design of Web Service Transactions
The development of composite Web services is still not as simple as the original vision indicated. Currently, the designer of a composite service needs to consider many different ...
Benjamin A. Schmit, Schahram Dustdar
SAINT
2003
IEEE
15 years 7 months ago
Secure Link State Routing for Mobile Ad Hoc Networks
The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, securit...
Panagiotis Papadimitratos, Zygmunt J. Haas
108
Voted
WISTP
2007
Springer
15 years 8 months ago
Optimistic Non-repudiation Protocol Analysis
Abstract. Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol...
Judson Santiago, Laurent Vigneron
111
Voted
FASE
2004
Springer
15 years 7 months ago
Compositional Nested Long Running Transactions
Abstract. Web Services offer a widespread standard for making services available on the Internet. Of particular interest is the possibility of composing existing distributed servi...
Laura Bocchi