Sciweavers

361 search results - page 29 / 73
» Composition of Password-Based Protocols
Sort
View
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 9 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 8 months ago
Verification of communicating data-driven web services
We study the verification of compositions of Web Service peers which interact asynchronously by exchanging messages. Each peer has access to a local database and reacts to user in...
Alin Deutsch, Liying Sui, Victor Vianu, Dayou Zhou
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
14 years 2 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
IASTEDSEA
2004
13 years 10 months ago
Erroneous architecture is a relative concept
The problem this paper addresses is that an architecture formed of software components can contain composition errors (introduced, for instance, as a result of the choice of afram...
Jirí Adámek, Frantisek Plasil
ICWS
2009
IEEE
14 years 5 months ago
Service Supervision: Coordinating Web Services in Open Environment
ite Web service designed based on abstract Web services, which define only interfaces, allows an application developer to select services required for his application only by set...
Masahiro Tanaka, Toru Ishida, Yohei Murakami, Sato...