-
1
-
-
0031334956
-
Alternating-time temporal logic
-
IEEE Computer Society Press
-
R. Alur, T. Henzinger and O. Kupferman, Alternating-time temporal logic, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, 1997, pp. 100-109.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 100-109
-
-
Alur, R.1
Henzinger, T.2
Kupferman, O.3
-
2
-
-
33646178489
-
MOCHA: Modularity in model checking
-
in: CAV 98: Computer-aided Verification, A. Hu and M. Vardi, eds; Springer-Verlag
-
R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani and S. Tasiran, MOCHA: modularity in model checking, in: CAV 98: Computer-aided Verification, A. Hu and M. Vardi, eds, Lecture Notes in Computer Science 1427, Springer-Verlag, 1998, pp. 521-525.
-
(1998)
Lecture Notes in Computer Science
, vol.1427
, pp. 521-525
-
-
Alur, R.1
Henzinger, T.2
Mang, F.3
Qadeer, S.4
Rajamani, S.5
Tasiran, S.6
-
3
-
-
0030646696
-
Optimistic protocols for fair exchange
-
T. Matsumoto, ed., Zurich, Switzerland, ACM Press
-
N. Asokan, M. Schunter and M. Waidner, Optimistic protocols for fair exchange, in: 4th ACM Conference on Computer and Communications Security, T. Matsumoto, ed., Zurich, Switzerland, ACM Press 1997, pp. 6, 8-17.
-
(1997)
4th ACM Conference on Computer and Communications Security
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
4
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
IEEE Computer Society Press
-
N. Asokan, V. Shoup and M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, 1998, pp. 86-99.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup and M. Waidner, Optimistic fair exchange of digital signatures, in: Advances in Cryptology - EUROCRYPT'98, Volume 1403 of Lecture Notes in Computer Science, 1998, pp. 591-606.
-
Advances in Cryptology - EUROCRYPT'98, Volume 1403 of Lecture Notes in Computer Science, 1998
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
6
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali and R.L. Rivest, A fair protocol for signing contracts. IEEE Transactions on Information Theory 36(1) (1990), 40-46.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
7
-
-
84974588386
-
Timed commitments
-
M. Bellare, ed., Springer-Verlag
-
D. Boneh and M. Naor, Timed commitments, in: Advances in Cryptology: Proceedings of Crypto 2000, Volume 1880 of Lecture Notes in Computer Science, M. Bellare, ed., Springer-Verlag. 2000, pp. 236-254.
-
(2000)
Advances in Cryptology: Proceedings of Crypto 2000, Volume 1880 of Lecture Notes in Computer Science
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
8
-
-
84856533229
-
Exploring fair exchange protocols using specification animation
-
C. Boyd and P. Kearney, Exploring fair exchange protocols using specification animation. in: The Third International Workshop on Information Security - ISW2000, Lecture Notes in Computer Science, Australia, Springer-Verlag, 2000.
-
The Third International Workshop on Information Security - ISW2000, Lecture Notes in Computer Science, Australia, Springer-Verlag, 2000
-
-
Boyd, C.1
Kearney, P.2
-
9
-
-
0013126638
-
A logic of authentication, from proceedings of the royal society
-
IEEE Computer Society Press, 1996
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, from proceedings of the royal society, Volume 426, number 1871, 1989, in: William Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996, 1996.
-
(1989)
William Stallings, Practical Cryptography for Data Internetworks
, vol.426
, Issue.1871
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
4243796648
-
Relations among public key signature systems
-
Technical Report 175, Technion, Haifa, Israel, Mar.
-
S. Even and Y. Yacobi, Relations among public key signature systems, Technical Report 175, Technion, Haifa, Israel, Mar. 1980.
-
(1980)
-
-
Even, S.1
Yacobi, Y.2
-
12
-
-
84906087402
-
Abstract interpretation of game properties
-
Lecture Notes in Computer Science, Springer-Verlag
-
T. Henzinger, R. Manjumdar, F. Mang and J.-F. Raskin, Abstract interpretation of game properties, in: SAS 2000: International Symposium on Static Analysis, Lecture Notes in Computer Science, Springer-Verlag, 2000.
-
(2000)
SAS 2000: International Symposium on Static Analysis
-
-
Henzinger, T.1
Manjumdar, R.2
Mang, F.3
Raskin, J.-F.4
-
13
-
-
0010569409
-
Optimistic non-repudiable information exchange
-
J. Biemond, ed., Werkgemeenschap Informatie- en Communicatietheorie, Enschede
-
S. Kremer and O. Markowitch, Optimistic non-repudiable information exchange, in: 21th Symp. on Information Theory in the Benelux, J. Biemond, ed., Werkgemeenschap Informatie- en Communicatietheorie, Enschede, 2000, pp. 139-146.
-
(2000)
21th Symp. on Information Theory in the Benelux
, pp. 139-146
-
-
Kremer, S.1
Markowitch, O.2
-
14
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
K. Larsen and M. Nielsen, eds, Aalborg, Denmark, Springer-Verlag
-
S. Kremer and J.-F. Raskin, A game-based verification of non-repudiation and fair exchange protocols, in: CONCUR: 12th International Conference on Concurrency Theory, Volume 2154 of Lecture Notes in Computer Science, K. Larsen and M. Nielsen, eds, Aalborg, Denmark, Springer-Verlag, 2001.
-
(2001)
CONCUR: 12th International Conference on Concurrency Theory, Volume 2154 of Lecture Notes in Computer Science
-
-
Kremer, S.1
Raskin, J.-F.2
-
15
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1995), 131-133.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR. in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 1055 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 147-166.
-
Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 1055 of Lecture Notes in Computer Science, Springer-Verlag, 1996
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
84959047912
-
A multi-party optimistic non-repudiation protocol
-
D. Won, ed., Seoul, Korea, Springer-Verlag
-
O. Markowitch and S. Kremer, A multi-party optimistic non-repudiation protocol, in: Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC 2000), Volume 2015 of Lecture Notes in Computer Science, D. Won, ed., Seoul, Korea, Springer-Verlag, 2000.
-
(2000)
Proceedings of the 3rd International Conference on Information Security and Cryptology (ICISC 2000), Volume 2015 of Lecture Notes in Computer Science
-
-
Markowitch, O.1
Kremer, S.2
-
18
-
-
2442472727
-
Probabilistic non-repudiation without trusted third party
-
O. Markowitch and Y. Roggeman, Probabilistic non-repudiation without trusted third party, in: Second Conference on Security in Communication Networks '99, Amalfi, Italy, 1999.
-
Second Conference on Security in Communication Networks '99, Amalfi, Italy, 1999
-
-
Markowitch, O.1
Roggeman, Y.2
-
19
-
-
84949740740
-
Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
-
C.A. Meadows, Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches, Lecture Notes in Computer Science 1146 (1996), 351-365.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 351-365
-
-
Meadows, C.A.1
-
20
-
-
0038562433
-
Certified E-mail with invisible post offices
-
S. Micali, Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 Conference, 1997.
-
RSA '97 Conference, 1997
-
-
Micali, S.1
-
22
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
S. Schneider, Formal analysis of a non-repudiation protocol, in: Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW '98), Washington - Brussels - Tokyo, IEEE, 1998, pp. 54-65.
-
Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW '98), Washington - Brussels - Tokyo, IEEE, 1998
, pp. 54-65
-
-
Schneider, S.1
-
23
-
-
85180809079
-
Analysis of a fair exchange protocol
-
V. Shmatikov and J. Mitchell, Analysis of a fair exchange protocol, in: Symposium on Network and Distributed Systems Security (NDSS '00), San Diego, CA, Internet Society, 2000, pp. 119-128.
-
Symposium on Network and Distributed Systems Security (NDSS '00), San Diego, CA, Internet Society, 2000
, pp. 119-128
-
-
Shmatikov, V.1
Mitchell, J.2
-
24
-
-
85088354270
-
Analysis of abuse-free contract signing
-
V. Shmatikov and J. Mitchell, Analysis of abuse-free contract signing, in: Financial Cryptography '00, Volume 1962 of Lecture Notes in Computer Science, Anguilla, Springer-Verlag, 2000.
-
Financial Cryptography '00, Volume 1962 of Lecture Notes in Computer Science, Anguilla, Springer-Verlag, 2000
-
-
Shmatikov, V.1
Mitchell, J.2
-
26
-
-
0038562431
-
How to exchange half a bit
-
D. Chaum, ed., Plenum Press, New York and London
-
T. Tedrick, How to exchange half a bit, in: Advances in Cryptology: Proceedings of Crypto 83, 1983, D. Chaum, ed., Plenum Press, New York and London, 1984, pp, 147-151.
-
(1984)
Advances in Cryptology: Proceedings of Crypto 83, 1983
, pp. 147-151
-
-
Tedrick, T.1
-
27
-
-
85034645810
-
Fair exchange of secrets
-
G.R. Blakley and D.C. Chaum, eds, Springer-Verlag
-
T. Tedrick, Fair exchange of secrets, in: Advances in Cryptology: Proceedings of Crypto 84, Volume 196 of Lecture Notes in Computer Science, G.R. Blakley and D.C. Chaum, eds, Springer-Verlag, 1985, pp. 434-438.
-
(1985)
Advances in Cryptology: Proceedings of Crypto 84, Volume 196 of Lecture Notes in Computer Science
, pp. 434-438
-
-
Tedrick, T.1
-
28
-
-
84957806482
-
Some remarks on a fair exchange protocol
-
J. Zhou, R. Deng and F. Bao, Some remarks on a fair exchange protocol, in: 2000 International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science, Melbourne, Australia, Springer-Verlag, 2000.
-
2000 International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science, Melbourne, Australia, Springer-Verlag, 2000
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
-
29
-
-
0039311188
-
Towards verification of non-repudiation protocols
-
J. Zhou and D. Gollmann, Towards verification of non-repudiation protocols, in: Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, Springer-Verlag, 1998, pp. 370-380.
-
Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, Springer-Verlag, 1998
, pp. 370-380
-
-
Zhou, J.1
Gollmann, D.2
|