Sciweavers

718 search results - page 23 / 144
» Operational Semantics of Security Protocols
Sort
View
ACMSE
2004
ACM
14 years 1 months ago
Security for fixed sensor networks
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging pro...
Ning Hu, Randy K. Smith, Phillip G. Bradford
SIES
2007
IEEE
14 years 2 months ago
Protocol Modelling Semantics for Embedded Systems
The properties of a domain oriented modelling approach or language are determined by the dominant semantics of the domain. A significant subclass that needs particular attention,...
Ashley T. McNeile, Ella E. Roubtsova
SEMWEB
2004
Springer
14 years 1 months ago
Semantic Web Service Interaction Protocols: An Ontological Approach
A central requirement for achieving the vision of run-time discovery and dynamic composition of services is the provision of appropriate descriptions of the operation of a service,...
Ronald Ashri, Grit Denker, Darren Marvin, Mike Sur...
COLCOM
2007
IEEE
14 years 2 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai