Sciweavers

361 search results - page 7 / 73
» Composition of Password-Based Protocols
Sort
View
STOC
2006
ACM
116views Algorithms» more  STOC 2006»
14 years 2 months ago
Information-theoretically secure protocols and security under composition
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies the security of these ...
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
BPM
2007
Springer
152views Business» more  BPM 2007»
14 years 2 months ago
Towards Dynamic Matching of Business-Level Protocols in Adaptive Service Compositions
In a service composition, it is necessary to ensure that the behaviour of a constituent service is consistent with the requirements of the composition. In an adaptive service compo...
Alan W. Colman, Linh Duy Pham, Jun Han, Jean-Guy S...
ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 6 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
HPCC
2007
Springer
14 years 14 days ago
FTSCP: An Efficient Distributed Fault-Tolerant Service Composition Protocol for MANETs
Abstract. Service composition, which enables users to construct complex services from atomic services, is an essential feature for the usability of Mobile Ad hoc Networks (MANETs)....
Zhen-guo Gao, Sheng Liu, Ming Ji, Jinhua Zhao, Lih...
ENTCS
2006
145views more  ENTCS 2006»
13 years 8 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers