Sciweavers

361 search results - page 28 / 73
» Composition of Password-Based Protocols
Sort
View
SIES
2007
IEEE
14 years 2 months ago
Protocol Modelling Semantics for Embedded Systems
The properties of a domain oriented modelling approach or language are determined by the dominant semantics of the domain. A significant subclass that needs particular attention,...
Ashley T. McNeile, Ella E. Roubtsova
VL
2003
IEEE
105views Visual Languages» more  VL 2003»
14 years 1 months ago
Visual composition of web services
Web services are increasingly attracting attention for their ability to provide standard interfaces to heterogeneous distributed services. Through these standard interfaces, it is...
Cesare Pautasso, Gustavo Alonso
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
CONEXT
2006
ACM
14 years 2 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
ICDCS
1999
IEEE
14 years 29 days ago
The Inter-group Router Approach to Scalable Group Composition
This paper examines the problem of building scalable, fault-tolerant distributed systems from collections of communicating process groups, while maintaining well-defined end-to-en...
Scott Johnson, Farnam Jahanian, Jigney Shah