Sciweavers

224 search results - page 28 / 45
» Transformations between Cryptographic Protocols
Sort
View
VLDB
2005
ACM
103views Database» more  VLDB 2005»
14 years 3 months ago
Consistency for Web Services Applications
A key challenge facing the designers of serviceoriented applications is ensuring that the autonomous services that make up these distributed applications always finish in consiste...
Paul Greenfield, Dean Kuo, Surya Nepal, Alan Feket...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 3 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
EPEW
2008
Springer
13 years 11 months ago
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
Abstract. We present an application of partial evaluation to performance models expressed in the PEPA stochastic process algebra [1]. We partially evaluate the state-space of a PEP...
Allan Clark, Adam Duguid, Stephen Gilmore, Mirco T...
CCS
2009
ACM
14 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
CRYPTO
1991
Springer
144views Cryptology» more  CRYPTO 1991»
14 years 1 months ago
Interactive Proofs with Space Bounded Provers
Recent results in interactive proof systems [?][?] [?] seem to indicate that it is easier for a prover in a single prover interactive proof system to cheat the verifier than it i...
Joe Kilian, Ronitt Rubinfeld