Back to Results
First PageMeta Content
Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols


A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland
Add to Reading List

Document Date: 2004-10-08 09:05:15


Open Document

File Size: 145,30 KB

Share Result on Facebook

City

Washington DC / Cambridge / Oakland / /

Company

Cbs / IBM / IEEE Computer / ACM Press / Sun Microsystem Inc. / SRI International / IEEE Press / IEEE Computer Society Press / Needham / /

Country

United States / Canada / United Kingdom / Ireland / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

University College Cork / Computer Science University College / /

IndustryTerm

behaved security protocols / authentication protocol / agreement protocols / security protocol / public key protocols / automatic backward search / basic protocol synthesis protocol / pre-help protocol / synthesised sub-protocols / helper protocols / help protocol / suitable security protocols / backward search / campus computing service / technology core platform specification version / possible protocols / cryptographic protocols / valid protocol / web-service / final candidate protocols / real secure protocol / survivable security protocols / collaborative protocol synthesis protocol / fixed exchange protocol / autonomic security protocols / n-party protocols / autonomic computing era / random candidate protocols / suitable protocol / candidate protocols / validation tool / provable secure protocols / particular protocol / evolutionary search / authentication protocols / collaborative protocol / security protocols / autonomic computing manifesto / /

Organization

S. These / Center for Unified Computing / Autonomic Security Protocols Hongbin Zhou Department / Computer Science University College / Boole Centre for Research / Simon N. Foley Department / University College / Cork / /

Person

Jeremy L Jacob / John A Clark / F. Javier Thayer / Raphael Yahalom / Alice / Clark / Joshua D. Guttman / Simon N. Foley / Roger Needham / Li Gong / Jonathan C. Herzog / B. Alternatively / /

Position

application designer / department manager / manager Alice A. When / writer / manager Trent T / protocol designer / /

Product

G5 / Helper agent / G1 / HP1 / Protocol / Helper / Deriver / P1 / P2 / G3 / /

ProgrammingLanguage

DC / /

ProvinceOrState

Nova Scotia / California / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

fixed exchange protocol / final candidate protocols / well behaved security protocols / synthesised protocol / fixed protocol / suitable protocol / cascading authentication protocol / Selfconfiguring protocols / helper protocols / 4.2 Extended BSW Protocol / basic protocol synthesis protocol / private key / security protocols / pre-help protocol / key agreement protocols / 4.1 Protocol / SSL / collaborative protocol synthesis protocol / candidate protocols / random candidate protocols / real secure protocol / underlying authentication protocols / security protocol / provable secure protocols / exchange protocol / A.5 The protocol / particular protocol / The help protocol / generated protocol / valid protocol / help protocol / survivable security protocols / possible protocols / suitable security protocols / SECURITY PROTOCOL SYNTHESIS Security Protocols / public key protocols / helping protocol / autonomic security protocols / n-party protocols / synthesised sub-protocols / /

URL

www.cs.ucc.ie/˜s.foley/pubs/secprot03.ps / www.jini.org / /

SocialTag