Sciweavers

49 search results - page 3 / 10
» Protocol Composition Frameworks A Header-Driven Model
Sort
View
CORR
2007
Springer
150views Education» more  CORR 2007»
13 years 9 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
DC
2007
13 years 9 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
IIWAS
2008
13 years 11 months ago
Model-driven engineering of composite web services using UML-S
Based on top of Web protocols and XML language, Web services are emerging as a framework to provide applicationto-application interaction. An important challenge is their integrat...
Christophe Dumez, Jaafar Gaber, Maxime Wack
ICALP
2007
Springer
13 years 11 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
13 years 11 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh