-
1
-
-
35048861871
-
Just fast keying in the pi calculus
-
David Schmidt, editor, 13th European Symposium on Programming (ESOP'04), Barcelona, Spain, March Springer
-
Martín Abadi, Bruno Blanchet, and Cedric Fournet. Just fast keying in the pi calculus. In David Schmidt, editor, 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 340-354, Barcelona, Spain, March 2004. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 340-354
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
2
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
Josep Diaz, Juhani Karhumäki, Arto Lepistö, and Don Sannella, editors, 31st Int. Coll. Automata, Languages, and Programming (ICALP'04), Turku, Finland, July Springer
-
Martín Abadi and Véronique Cortier. Deciding knowledge in security protocols under equational theories. In Josep Diaz, Juhani Karhumäki, Arto Lepistö, and Don Sannella, editors, 31st Int. Coll. Automata, Languages, and Programming (ICALP'04), volume 3142 of Lecture Notes in Computer Science, pages 46-58, Turku, Finland, July 2004. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
17644411480
-
Mobile values, new names, and secure communication
-
Hanne Riis Nielson, editor, London, UK, January ACM
-
Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. In Hanne Riis Nielson, editor, Proceedings of the 28th ACM Symposium on Principles of Programming Languages, pages 104-115, London, UK, January 2001. ACM.
-
(2001)
Proceedings of the 28th ACM Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Steve Schneider, editor, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press
-
Bruno Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Steve Schneider, editor, 14th IEEE Computer Security Foundations Workshop, pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
-
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
5
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
Oakland, California, May
-
Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, Oakland, California, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
6
-
-
4944247375
-
Formal analysis of multi-party contract signing
-
Riccardo Focardi, editor, Asilomar, CA, USA, June 2004. IEEE Computer Society Press
-
Rohit Chadha, Steve Kremer, and Andre Scedrov. Formal analysis of multi-party contract signing. In Riccardo Focardi, editor, 17th IEEE Computer Security Foundations Workshop, pages 266-279, Asilomar, CA, USA, June 2004. IEEE Computer Society Press.
-
17th IEEE Computer Security Foundations Workshop
, pp. 266-279
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
7
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum Press
-
David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, Proceedings of CRYPTO'82, pages 199-203. Plenum Press, 1983.
-
(1983)
Advances in Cryptology, Proceedings of CRYPTO'82
, pp. 199-203
-
-
Chaum, D.1
-
9
-
-
24644449338
-
-
Personal communication
-
Véronique Cortier. Personal communication, 2004.
-
(2004)
-
-
Cortier, V.1
-
10
-
-
4944242015
-
A theory of dictionary attacks and its complexity
-
Riccardo Focardi, editor, Asilomar, Pacific Grove, CA, USA, June IEEE Computer Society Press
-
Stéphanie Delaune and Florent Jacquemard. A theory of dictionary attacks and its complexity. In Riccardo Focardi, editor, 17th IEEE Computer Security Foundations Workshop, pages 2-15, Asilomar, Pacific Grove, CA, USA, June 2004. IEEE Computer Society Press.
-
(2004)
17th IEEE Computer Security Foundations Workshop
, pp. 2-15
-
-
Delaune, S.1
Jacquemard, F.2
-
12
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92, Springer
-
Atsushi Fujioka, Tatsuaki Okamoto, and Kazui Ohta. A practical secret voting scheme for large scale elections. In J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92, volume 718 of Lecture Notes in Computer Science, pages 244-251. Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
14
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
15
-
-
4944228536
-
Analysing protocols subject to guessing attacks
-
Joshua Guttman, editor, Portland, Oregon, USA, January
-
Gavin Lowe. Analysing protocols subject to guessing attacks. In Joshua Guttman, editor, In Proceedings of the Workshop on Issues in the Theory of Security (WITS'02), Portland, Oregon, USA, January 2002.
-
(2002)
Proceedings of the Workshop on Issues in the Theory of Security (WITS'02)
-
-
Lowe, G.1
-
16
-
-
33749663619
-
-
Master's thesis, Comenius University
-
Zuzana Rjaskova. Electronic voting schemes. Master's thesis, Comenius University, 2002. www.tes.hut.fi/~helger/crypto/link/protocols/voting.html.
-
(2002)
Electronic Voting Schemes
-
-
Rjaskova, Z.1
|