Sciweavers

3504 search results - page 96 / 701
» Secure protocol composition
Sort
View
123
Voted
COMPSAC
2007
IEEE
15 years 9 months ago
Requirements and Evaluation of Protocols and Tools for Transaction Management in Service Centric Systems
As Service Centric (SC) Systems are being increasingly adopted, new challenges and possibilities emerge. Business processes are now able to execute seamlessly across organizations...
Chang-ai Sun, Marco Aiello
121
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 8 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
120
Voted
COMPSAC
2009
IEEE
15 years 9 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
114
Voted
GCC
2004
Springer
15 years 8 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
120
Voted
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 9 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi