Sciweavers

361 search results - page 10 / 73
» Composition of Password-Based Protocols
Sort
View
EEE
2005
IEEE
14 years 2 months ago
Composition of Negotiation Protocols for E-Commerce Applications
A company doing e-business needs capabilities to negotiate electronically the parameters of its deals in order to fully utilize the potential of the Information and Communication ...
Nikolay K. Diakov, Zlatko Zlatev, Stanislav Pokrae...
ESOP
2004
Springer
14 years 2 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CCS
2003
ACM
14 years 1 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CCS
2008
ACM
13 years 10 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
GCC
2007
Springer
14 years 2 months ago
A Classification of Service Composition Mismatches to Support Service Mediation
On building a service-oriented architecture for Grid systems, more and more researches have been focused on service composition. Services, however, are not always exactly compatib...
Xitong Li, Yushun Fan, Feng Jiang