Sciweavers

361 search results - page 39 / 73
» Composition of Password-Based Protocols
Sort
View
ESORICS
2006
Springer
14 years 11 days ago
Conditional Reactive Simulatability
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
Michael Backes, Markus Dürmuth, Dennis Hofhei...
AOSD
2010
ACM
13 years 9 months ago
An architecture for composing embedded domain-specific languages
Embedded domain-specific languages (EDSLs) are said to be easier to compose than DSLs that are implemented by preprocessors. However, existing approaches focus on composition scen...
Tom Dinkelaker, Michael Eichberg, Mira Mezini
CCS
2005
ACM
14 years 2 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
OTM
2005
Springer
14 years 2 months ago
Document Flow Model: A Formal Notation for Modelling Asynchronous Web Services Composition
This paper presents a formal notation for modelling asynchronous web services composition, using context and coordination mechanisms. Our notation specifies the messages that can b...
Jingtao Yang, Corina Cîrstea, Peter Henderso...
ICFEM
2010
Springer
13 years 7 months ago
A Semantic Model for Service Composition with Coordination Time Delays
The correct behavior of a service composition depends on the appropriate coordination of its services. According to the idea of channelbased coordination, services exchange message...
Natallia Kokash, Behnaz Changizi, Farhad Arbab