Sciweavers

65 search results - page 5 / 13
» A Formal General Setting for Dialogue Protocols
Sort
View
LICS
1999
IEEE
13 years 11 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ATAL
2006
Springer
13 years 11 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
EUROCRYPT
2001
Springer
13 years 12 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
ICMAS
1998
13 years 8 months ago
Interaction Protocols in Agentis
Agentis is a framework for building interactive multiagent applications which is based upon a model of agent interaction whose key elements are services and tasks. Central to the ...
Mark d'Inverno, David Kinny, Michael Luck
FMSD
2006
103views more  FMSD 2006»
13 years 7 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol