Sciweavers

1490 search results - page 243 / 298
» The Logic of Authentication Protocols
Sort
View
TII
2008
132views more  TII 2008»
13 years 8 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
ACSAC
2010
IEEE
13 years 6 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
FOCS
2010
IEEE
13 years 6 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 9 months ago
Verification of communicating data-driven web services
We study the verification of compositions of Web Service peers which interact asynchronously by exchanging messages. Each peer has access to a local database and reacts to user in...
Alin Deutsch, Liying Sui, Victor Vianu, Dayou Zhou
COMPSAC
2007
IEEE
14 years 3 months ago
An Instant Messaging Framework for Flexible Interaction with Rich Clients
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to ...
Matthias Book, Volker Gruhn