Sciweavers

1777 search results - page 240 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
1998
Springer
14 years 1 months ago
Providing Reliable Agents for Electronic Commerce
It is widely agreed that mobile agents in conjunction with WWW technology will provide the technical foundation for future electronic commerce. A prerequisite for the use of mobile...
Markus Straßer, Kurt Rothermel, Christian Ma...
IFIP
2010
Springer
13 years 3 months ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro
IFIP
2010
Springer
13 years 3 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
ICLP
2009
Springer
14 years 3 months ago
An Overview of FORCES: An INRIA Project on Declarative Formalisms for Emergent Systems
Abstract. The FORCES project aims at providing robust and declarative formalisms for analyzing systems in the emerging areas of Security Protocols, Biological Systems and Multimedi...
Jesús Aranda, Gérard Assayag, Carlos...
ICALP
2007
Springer
14 years 3 months ago
Private Multiparty Sampling and Approximation of Vector Combinations
We consider the problem of private efficient data mining of vertically-partitioned databases. Each of several parties holds a column of a data matrix (a vector) and the parties wan...
Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecc...