Communication protocols are the computational basis for distributed electronic commerce systems, and thus the properties of these protocols define the forms of commerce possible in electronic systems. Existing protocols used for electronic commerce focus primarily on security properties, including message integrity, privacy and non-repudiation, and on basic transaction properties, usually just atomicity; their structural properties are limited to supporting two-party transactions with fixed semantics. We believe that the properties provided by these protocols limit their use to simple forms of commerce. In this paper we define the properties we believe are necessary for electronic commerce protocols. These include the security properties of...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
AbstractMotivated by recent work of Abiteboul, Vianu, Fordham, and Yesha, we investigate the verifia...
Communication protocols are the computational basis for distributed electronic commerce systems, and...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
E-commerce transactions rely on end-to-end protocols to provide security guarantees when messages ar...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
AbstractThe primary objective of this paper is to present the definition of a new dynamic, linear an...
Abstract. Causal reasoning is a powerful tool in analysing security protocols, as seen in the popula...
Commerce is the exchange of goods, services and financial instruments conducted by procedures which ...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
This paper presents a novel technique for analyzing security protocols based on an abstraction of th...
Smart contracts combine protocols with user interfaces to formalize and secure relationships over co...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
AbstractMotivated by recent work of Abiteboul, Vianu, Fordham, and Yesha, we investigate the verifia...
Communication protocols are the computational basis for distributed electronic commerce systems, and...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
E-commerce transactions rely on end-to-end protocols to provide security guarantees when messages ar...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
AbstractThe primary objective of this paper is to present the definition of a new dynamic, linear an...
Abstract. Causal reasoning is a powerful tool in analysing security protocols, as seen in the popula...
Commerce is the exchange of goods, services and financial instruments conducted by procedures which ...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
This paper presents a novel technique for analyzing security protocols based on an abstraction of th...
Smart contracts combine protocols with user interfaces to formalize and secure relationships over co...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
AbstractMotivated by recent work of Abiteboul, Vianu, Fordham, and Yesha, we investigate the verifia...