Sciweavers

2478 search results - page 258 / 496
» Message from the Chair
Sort
View
143
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 10 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
15 years 10 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
119
Voted
HICSS
2005
IEEE
101views Biometrics» more  HICSS 2005»
15 years 10 months ago
Accessing Tacit Knowledge in the Pediatric Pain E-Mail Archives
The Pediatric Pain Mailing List (PPML) is an international Internet-based forum for informal discussion of any topic related to pain in children. There are now over seven hundred ...
Qiufen Qi, Qigang Gao, Michael A. Shepherd, G. All...
WETICE
2005
IEEE
15 years 10 months ago
Towards a formal framework for Choreography
— One of the main challenges in the area of Service Oriented Computing, in general, and of Web services technology, in particular, is the definition of languages and models for ...
Nadia Busi, Roberto Gorrieri, Claudio Guidi, Rober...
ACNS
2005
Springer
124views Cryptology» more  ACNS 2005»
15 years 10 months ago
Building Reliable Mix Networks with Fair Exchange
In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anon...
Michael K. Reiter, XiaoFeng Wang, Matthew Wright