Sciweavers

1490 search results - page 162 / 298
» The Logic of Authentication Protocols
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 4 months ago
Enhanced Prolog Remote Predicate Call Protocol
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC) [1]. The Prol...
Alin Suciu, Kalman Pusztai, Andrei Diaconu
158
Voted
PROLAMAT
2001
15 years 5 months ago
Logical Communication Levels in an Intelligent Flexible Manufacturing System
: In most cases in intelligent manufacturing applications the communication functions depend on the capabilities of the intelligent tool (e.g. expert system). Three different types...
J. Nacsa
125
Voted
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 10 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
CCS
2003
ACM
15 years 9 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
ICFEM
2010
Springer
15 years 2 months ago
Model-Driven Protocol Design Based on Component Oriented Modeling
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Prabhu Shankar Kaliappan, Hartmut König, Seba...