View Document Preview and Link
Document Date: 2004-10-08 09:05:15 Open Document File Size: 145,30 KB Share Result on Facebook
City Washington DC / Cambridge / Oakland / / Company Cbs / IBM / IEEE Computer / ACM Press / Sun Microsystem Inc. / SRI International / IEEE Press / IEEE Computer Society Press / Needham / / Country United States / Canada / United Kingdom / Ireland / / Currency pence / USD / / / Event FDA Phase / / Facility University College Cork / Computer Science University College / / IndustryTerm behaved security protocols / authentication protocol / agreement protocols / security protocol / public key protocols / automatic backward search / basic protocol synthesis protocol / pre-help protocol / synthesised sub-protocols / helper protocols / help protocol / suitable security protocols / backward search / campus computing service / technology core platform specification version / possible protocols / cryptographic protocols / valid protocol / web-service / final candidate protocols / real secure protocol / survivable security protocols / collaborative protocol synthesis protocol / fixed exchange protocol / autonomic security protocols / n-party protocols / autonomic computing era / random candidate protocols / suitable protocol / candidate protocols / validation tool / provable secure protocols / particular protocol / evolutionary search / authentication protocols / collaborative protocol / security protocols / autonomic computing manifesto / / Organization S. These / Center for Unified Computing / Autonomic Security Protocols Hongbin Zhou Department / Computer Science University College / Boole Centre for Research / Simon N. Foley Department / University College / Cork / / Person Jeremy L Jacob / John A Clark / F. Javier Thayer / Raphael Yahalom / Alice / Clark / Joshua D. Guttman / Simon N. Foley / Roger Needham / Li Gong / Jonathan C. Herzog / B. Alternatively / / Position application designer / department manager / manager Alice A. When / writer / manager Trent T / protocol designer / / Product G5 / Helper agent / G1 / HP1 / Protocol / Helper / Deriver / P1 / P2 / G3 / / ProgrammingLanguage DC / / ProvinceOrState Nova Scotia / California / / PublishedMedium IEEE Transactions on Information Theory / / Technology fixed exchange protocol / final candidate protocols / well behaved security protocols / synthesised protocol / fixed protocol / suitable protocol / cascading authentication protocol / Selfconfiguring protocols / helper protocols / 4.2 Extended BSW Protocol / basic protocol synthesis protocol / private key / security protocols / pre-help protocol / key agreement protocols / 4.1 Protocol / SSL / collaborative protocol synthesis protocol / candidate protocols / random candidate protocols / real secure protocol / underlying authentication protocols / security protocol / provable secure protocols / exchange protocol / A.5 The protocol / particular protocol / The help protocol / generated protocol / valid protocol / help protocol / survivable security protocols / possible protocols / suitable security protocols / SECURITY PROTOCOL SYNTHESIS Security Protocols / public key protocols / helping protocol / autonomic security protocols / n-party protocols / synthesised sub-protocols / / URL www.cs.ucc.ie/˜s.foley/pubs/secprot03.ps / www.jini.org / / SocialTag