Sciweavers

176 search results - page 13 / 36
» Abstraction and Refinement in Protocol Derivation
Sort
View
ESWS
2008
Springer
13 years 9 months ago
Learning Highly Structured Semantic Repositories from Relational Databases:
Abstract. Relational databases are valuable sources for ontology learning. Methods and tools have been proposed to generate ontologies from such structured input. However, a major ...
Farid Cerbah
JCP
2007
122views more  JCP 2007»
13 years 7 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
14 years 6 days ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
ESORICS
2003
Springer
14 years 1 months ago
Initiator-Resilient Universally Composable Key Exchange
Abstract. Key exchange protocols in the setting of universal composability are investigated. First we show that the ideal functionality FKE of [9] cannot be realized in the presenc...
Dennis Hofheinz, Jörn Müller-Quade, Rain...