Sciweavers

361 search results - page 49 / 73
» Composition of Password-Based Protocols
Sort
View
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
14 years 9 months ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 2 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
CBSE
2008
Springer
13 years 10 months ago
State Space Reduction Techniques for Component Interfaces
Abstract. Automata-based interface and protocol specifications provide an elegant framework to capture and automatically verify the interactive behavior of component-based software...
Markus Lumpe, Lars Grunske, Jean-Guy Schneider
USENIX
2004
13 years 10 months ago
High Performance X Servers in the Kdrive Architecture
The common usage patterns of 2D drivers for the X Window System have changed over time. New extensions such as Render and Composite are creating new demands for 2D rendering which...
Eric Anholt
ENTCS
2006
146views more  ENTCS 2006»
13 years 8 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...