Sciweavers

563 search results - page 94 / 113
» Verifiable Signature Sharing
Sort
View
EUROCRYPT
2000
Springer
14 years 13 days ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
APN
1995
Springer
14 years 12 days ago
Modular State Space Analysis of Coloured Petri Nets
State Space Analysis is one of the most developed analysis methods for Petri Nets. The main problem of state space analysis is the size of the state spaces. Several ways to reduce ...
Søren Christensen, Laure Petrucci
CAV
2010
Springer
206views Hardware» more  CAV 2010»
14 years 4 days ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
13 years 10 months ago
Inter-organizational Knowledge Transfer in the Buyer-Supplier Relationship: A Buyer's Perspective
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Sung-Byung Yang, Young-Gul Kim
ER
2008
Springer
109views Database» more  ER 2008»
13 years 10 months ago
Value-Driven Coordination Process Design Using Physical Delivery Models
Abstract. Current e-business technology enables the execution of increasingly complex coordination processes that link IT services of different companies. Successful design of cros...
Roel Wieringa, Vincent Pijpers, Lianne Bodenstaff,...