Sciweavers

3115 search results - page 22 / 623
» Synthesizing Secure Protocols
Sort
View
DEBU
2008
69views more  DEBU 2008»
13 years 9 months ago
Web Service Protocols: Compatibility and Adaptation
This paper discusses the notion of protocol compatibility between Web services, and reviews a number of techniques for detecting incompatibilities and for synthesizing adapters fo...
Marlon Dumas, Boualem Benatallah, Hamid R. Motahar...
ISICT
2003
13 years 10 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
CSFW
1997
IEEE
14 years 1 months ago
Strategies against Replay Attacks
Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
Tuomas Aura
WPES
2003
ACM
14 years 2 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
ASWEC
2006
IEEE
14 years 3 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge