Sciweavers

1106 search results - page 199 / 222
» Automated Design of Security Protocols
Sort
View
LATINCRYPT
2010
13 years 8 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
CASES
2010
ACM
13 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
WWW
2005
ACM
14 years 10 months ago
A publish and subscribe collaboration architecture for web-based information
Markup languages, representations, schemas, and tools have significantly increased the ability for organizations to share their information. Languages, such as the Extensible Mark...
M. Brian Blake, David H. Fado, Gregory A. Mack
WWW
2003
ACM
14 years 10 months ago
A software framework for matchmaking based on semantic web technology
An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardization of ontologies, message content...
Lei Li, Ian Horrocks
DSVIS
2005
Springer
14 years 3 months ago
Towards Model Checking Stochastic Aspects of the thinkteam User Interface
Abstract. Stochastic model checking is a recent extension of traditional modelchecking techniques for the integrated analysis of both qualitative and quantitative system properties...
Maurice H. ter Beek, Mieke Massink, Diego Latella