Sciweavers

361 search results - page 25 / 73
» Composition of Password-Based Protocols
Sort
View
TES
2004
Springer
14 years 2 months ago
From Web Service Composition to Megaprogramming
Abstract. With the emergence of Web service technologies, it has become possible to use high level megaprogramming models and visual tools to easily build distributed systems using...
Cesare Pautasso, Gustavo Alonso
DC
2007
13 years 8 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
GI
2004
Springer
14 years 2 months ago
Automating the Development of Web Service Compositions Using Templates
: The development of Web Service compositions has not yet been automated. Web Service-based process definitions can be created automatically using Web Service compositions template...
Dimka Karastoyanova, Alejandro P. Buchmann
ACSD
2009
IEEE
106views Hardware» more  ACSD 2009»
13 years 11 months ago
Specification Enforcing Refinement for Convertibility Verification
Protocol conversion deals with the automatic synthesis of an additional component, often referred to as an adaptor or a converter, to bridge mismatches between interacting compone...
Partha S. Roop, Alain Girault, Roopak Sinha, Grego...
FOCS
2003
IEEE
14 years 1 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell