Sciweavers

361 search results - page 15 / 73
» Composition of Password-Based Protocols
Sort
View
FOSSACS
2009
Springer
14 years 3 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
14 years 2 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
IJWET
2010
142views more  IJWET 2010»
13 years 7 months ago
Interaction protocol mediation in web service composition
: This article presents a mediation framework supporting the integration of web services in orchestrated and choreographed services and the conciliation of interaction protocol mis...
Liliana Ardissono, Roberto Furnari, Giovanna Petro...
CRYPTO
2009
Springer
144views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
On the Composition of Public-Coin Zero-Knowledge Protocols
Abstract. We show that only languages in BPP have public-coin, blackbox zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. Thi...
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikstr...