Sciweavers

32 search results - page 4 / 7
» Verifying Compliance with Commitment Protocols
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The main reason for constructing sealed-bid auction prot...
Mehrdad Nojoumian, Douglas R. Stinson
AAI
2006
89views more  AAI 2006»
13 years 7 months ago
Compliance verification of agent interaction: a logic-based software tool
In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thu...
Marco Alberti, Marco Gavanelli, Evelina Lamma, Fed...
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 1 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
CSI
2008
82views more  CSI 2008»
13 years 7 months ago
Efficient and secure protocol in fair document exchange
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a va...
Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qi...
IJWET
2006
89views more  IJWET 2006»
13 years 7 months ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...