Sciweavers

1834 search results - page 204 / 367
» Public Key Cryptography
Sort
View
FSTTCS
2007
Springer
14 years 3 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
IMECS
2007
13 years 10 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
IJFCS
2007
93views more  IJFCS 2007»
13 years 9 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
MMMACNS
2010
Springer
13 years 7 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...
HICSS
2006
IEEE
150views Biometrics» more  HICSS 2006»
14 years 3 months ago
E-Government Evaluation: Reflections on Two Organisational Studies
Senior executives in public sector organisations have been charged with delivering an e-Government agenda. A key emerging area of research is that of the evaluation of e-Governmen...
Stephen Jones, Zahir Irani, Amir M. Sharif, Marino...