Sciweavers

361 search results - page 59 / 73
» Message Sequence Charts
Sort
View
ICWS
2010
IEEE
13 years 9 months ago
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of messa...
Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid
ICISC
2007
152views Cryptology» more  ICISC 2007»
13 years 9 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
ACE
2004
207views Education» more  ACE 2004»
13 years 9 months ago
Teaching Java First: Experiments with a Pigs-Early Pedagogy
This paper introduces PigWorld, a tool for teaching Java to novice programmers, via the objects-early style. Three design guidelines forobject-early assignments are discussed: (1)...
Raymond Lister
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 7 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
JOC
2011
102views more  JOC 2011»
13 years 2 months ago
Wildcarded Identity-Based Encryption
In this paper we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers ...
Michel Abdalla, James Birkett, Dario Catalano, Ale...