Sciweavers

361 search results - page 20 / 73
» Composition of Password-Based Protocols
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
WWW
2004
ACM
14 years 9 months ago
A semantic approach for designing business protocols
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...
Ashok U. Mallya, Munindar P. Singh
FASE
2004
Springer
14 years 2 months ago
Compositional Nested Long Running Transactions
Abstract. Web Services offer a widespread standard for making services available on the Internet. Of particular interest is the possibility of composing existing distributed servi...
Laura Bocchi
WORDS
2002
IEEE
14 years 1 months ago
Schedulability Analysis of an Event-Based Real-Time Protocol Framework
This paper presents a method to analyze the timing behavior of an event-based real-time protocol composition framework. The framework, called RT-Appia, allows the development and ...
João Rodrigues, João Ventura, Lu&iac...
ICCCN
2008
IEEE
14 years 3 months ago
The RNA Metaprotocol
— The Recursive Network Architecture (RNA) explores the relationship of layering to protocol and network architecture. RNA examines the implications of using a single, tunable pr...
Joseph D. Touch, Venkata K. Pingali