Sciweavers

1490 search results - page 208 / 298
» The Logic of Authentication Protocols
Sort
View
100
Voted
IJFCS
2007
93views more  IJFCS 2007»
15 years 15 days ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
98
Voted
JUCS
2007
88views more  JUCS 2007»
15 years 14 days ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic
80
Voted
COMCOM
2000
79views more  COMCOM 2000»
15 years 12 days ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
107
Voted
SIGDIAL
2010
14 years 10 months ago
YouBot: A Simple Framework for Building Virtual Networking Agents
This paper proposes a simple framework for building 'virtual networking agents'; programs that can communicate with users and collect information through the internet. T...
Seiji Takegata, Kumiko Tanaka-Ishii
114
Voted
DALT
2007
Springer
15 years 4 months ago
Extending Propositional Logic with Concrete Domains for Multi-issue Bilateral Negotiation
We present a novel approach to knowledge-based automated one-shot multi-issue bilateral negotiation handling, in a homogeneous setting, both numerical features and non-numerical on...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...