Sciweavers

3088 search results - page 180 / 618
» Multichannel Security Protocols
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
AINA
2005
IEEE
14 years 3 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito
POLICY
2007
Springer
14 years 4 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
CSFW
1995
IEEE
14 years 1 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
LREC
2010
132views Education» more  LREC 2010»
13 years 11 months ago
Resources for Controlled Languages for Alert Messages and Protocols in the European Perspective
This paper is concerned with resources for controlled languages for alert messages and protocols in the European perspective. These resources have been produced as the outcome of ...
Sylviane Cardey, Krzysztof Bogacki, Xavier Blanco,...