Sciweavers

672 search results - page 27 / 135
» Analysis and applications of timed service protocols
Sort
View
ESORICS
2005
Springer
14 years 2 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ECOWS
2007
Springer
13 years 10 months ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
SAINT
2008
IEEE
14 years 3 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
AIME
1997
Springer
14 years 1 months ago
A Task-Specific Ontology for the Application and Critiquing of Time-Oriented Clinical Guidelines
: Clinical guidelines reuse existing clinical procedural knowledge while leaving room for flexibility by the care provider applying that knowledge. Guidelines can be viewed as gene...
Yuval Shahar, Silvia Miksch, Peter Johnson
ICAS
2005
IEEE
129views Robotics» more  ICAS 2005»
14 years 2 months ago
Admissible traffic load of real time class of service for inter-domain peers
The paper1 deals with the problem of assuring predefined QoS for real time (RT) class of service (CoS), which we define as one of inter-provider or inter-domain classes of service...
Halina Tarasiuk, Robert Janowski, Wojciech Burakow...