Sciweavers

3504 search results - page 84 / 701
» Secure protocol composition
Sort
View
132
Voted
ACSW
2003
15 years 3 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
112
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
KBSE
2008
IEEE
15 years 9 months ago
A Case Study on the Automatic Composition of Network Application Mashups
MaxMash is a tool that can compose select features of networked application and generate the source code for application mashups that can integrate those features. This paper pres...
Maxim Shevertalov, Spiros Mancoridis
DEXAW
2005
IEEE
132views Database» more  DEXAW 2005»
15 years 8 months ago
A Decentralized Agent Framework for Dynamic Composition and Coordination for Autonomic Applications
This paper introduces a peer-to-peer agent framework for supporting autonomic applications in decentralized distributed environments. The framework provides agents to discover, co...
Zhen Li, Manish Parashar
PODC
2010
ACM
15 years 6 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer