Sciweavers

3504 search results - page 90 / 701
» Secure protocol composition
Sort
View
IEEEARES
2009
IEEE
15 years 9 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
107
Voted
CORR
2008
Springer
166views Education» more  CORR 2008»
15 years 2 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
131
Voted
ICWS
2004
IEEE
15 years 4 months ago
Realizability of Conversation Protocols With Message Contents
A conversation protocol is a top-down specification framework which specifies desired global behaviors of a web service composition. In our earlier work [6] we studied the problem...
Xiang Fu, Tevfik Bultan, Jianwen Su
123
Voted
ACISP
2008
Springer
15 years 9 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu
112
Voted
ACISP
2010
Springer
15 years 4 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila