Sciweavers

180 search results - page 22 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
CIA
2001
Springer
15 years 4 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
WETICE
2003
IEEE
15 years 5 months ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
AGENTS
2000
Springer
15 years 4 months ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer
CSFW
1998
IEEE
15 years 4 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
LISP
2002
107views more  LISP 2002»
14 years 11 months ago
Dependent Types for Program Termination Verification
Program termination verification is a challenging research subject of significant practical importance. While there is already a rich body of literature on this subject, it is sti...
Hongwei Xi