Sciweavers

253 search results - page 39 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
SEMWEB
2004
Springer
14 years 27 days ago
Semantic Web Service Interaction Protocols: An Ontological Approach
A central requirement for achieving the vision of run-time discovery and dynamic composition of services is the provision of appropriate descriptions of the operation of a service,...
Ronald Ashri, Grit Denker, Darren Marvin, Mike Sur...
JUCS
2010
152views more  JUCS 2010»
13 years 2 months ago
Compositional Semantics of Dataflow Networks with Query-Driven Communication of Exact Values
: We develop and study the concept of dataflow process networks as used for example by Kahn to suit exact computation over data types related to real numbers, such as continuous fu...
Michal Konecný, Amin Farjudian
EMSOFT
2009
Springer
14 years 2 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 5 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ACSAC
2002
IEEE
14 years 16 days ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko