Sciweavers

361 search results - page 26 / 73
» Composition of Password-Based Protocols
Sort
View
CARDIS
2010
Springer
175views Hardware» more  CARDIS 2010»
14 years 3 months ago
The Polynomial Composition Problem in (Z/nZ)[X]
Let n be an RSA modulus and let P, Q ∈ (Z/nZ)[X]. This paper explores the following problem: Given polynomials Q and Q(P), find polynomial P. We shed light on the connections be...
Marc Joye, David Naccache, Stéphanie Porte
PERCOM
2006
ACM
14 years 8 months ago
On the Fly Service Composition for Local Interaction Environments
Dynamically creating new, composite services "on the fly" using existing ones in a local interaction environment (e.g. a home, meeting room, airport lounge, etc.) presen...
Hossein Pourreza, Peter Graham
SOCO
2005
Springer
14 years 2 months ago
Improving Composition Support with Lightweight Metadata-Based Extensions of Component Models
Software systems that rely on the component paradigm build new components by assembling existing prefabricated components. Most currently available IDEs support graphical component...
Johann Oberleitner, Michael Fischer
APN
2008
Springer
13 years 10 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
CSFW
1998
IEEE
14 years 28 days ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...