-
3
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology 1(1) (1988), 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
4
-
-
35248866624
-
Mix-networks with restricted routes
-
Proc. Privacy Enhancing Technologies Workshop (PET 2003), R. Dingledine, ed., Springer-Verlag, Berlin/New York
-
G. Danezis, Mix-networks with restricted routes, in: Proc. Privacy Enhancing Technologies Workshop (PET 2003), R. Dingledine, ed., Volume 2760 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2003, pp. 54-68.
-
(2003)
Lecture Notes in Computer Science
, vol.2760
, pp. 54-68
-
-
Danezis, G.1
-
5
-
-
84957800033
-
Towards measuring anonymity
-
Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Springer-Verlag, Berlin/New York
-
C. Diaz, S. Seys, J. Claessens and B. Preneel, Towards measuring anonymity, in: Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Volume 2482 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2002, pp. 54-68.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
6
-
-
0025465251
-
A logic for reasoning about probabilities
-
R. Fagin, J.Y. Halpern and N. Megiddo, A logic for reasoning about probabilities, Information and Computation 87(1/2) (1990), 78-128.
-
(1990)
Information and Computation
, vol.87
, Issue.1-2
, pp. 78-128
-
-
Fagin, R.1
Halpern, J.Y.2
Megiddo, N.3
-
7
-
-
0003730235
-
-
MIT Press, Cambridge, MA
-
R. Fagin, J.Y. Halpern, Y. Moses and M.Y. Vardi, Reasoning about Knowledge, MIT Press, Cambridge, MA, 1995.
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
8
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Springer-Verlag
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Foundationsof Security Analysis and Design, Springer-Verlag, 2001, pp. 331-396.
-
(2001)
Foundationsof Security Analysis and Design
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
9
-
-
35248847052
-
Hiding names: Private authentication in the applied pi calculus
-
Proc. International Symposium on Software Security (ISSS 2002), Springer-Verlag, Berlin/New York
-
C. Fournet and M. Abadi, Hiding names: Private authentication in the applied pi calculus, in: Proc. International Symposium on Software Security (ISSS 2002), Volume 2609 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2003, pp. 317-338.
-
(2003)
Lecture Notes in Computer Science
, vol.2609
, pp. 317-338
-
-
Fournet, C.1
Abadi, M.2
-
10
-
-
0026900438
-
A logic for reasoning about security
-
J. Glasgow, G. MacEwen and P. Panangaden, A logic for reasoning about security, ACM Transactions on Computer Systems 10(3) (1992), 226-264.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
MacEwen, G.2
Panangaden, P.3
-
12
-
-
0032047481
-
A logical approach to multillevel security of probabilistic systems
-
J.W. Gray and P.F. Syverson, A logical approach to multillevel security of probabilistic systems, Distributed Computing 11(2) (1998), 73-90.
-
(1998)
Distributed Computing
, vol.11
, Issue.2
, pp. 73-90
-
-
Gray, J.W.1
Syverson, P.F.2
-
15
-
-
0035754511
-
On the relationship between strand spaces and multi-agent systems
-
To appear, ACM Transactions on Information and System Security
-
J.Y. Halpern and R. Pucella, On the relationship between strand spaces and multi-agent systems, in: Proc. Eighth ACM Conference on Computer and Communications Security, 2001, pp. 106-115. To appear, ACM Transactions on Information and System Security.
-
(2001)
Proc. Eighth ACM Conference on Computer and Communications Security
, pp. 106-115
-
-
Halpern, J.Y.1
Pucella, R.2
-
16
-
-
0027665952
-
Knowledge, probability, and adversaries
-
J.Y. Halpern and M.R. Tuttle, Knowledge, probability, and adversaries, Journal of the ACM 40(4) (1993), 917-962.
-
(1993)
Journal of the ACM
, vol.40
, Issue.4
, pp. 917-962
-
-
Halpern, J.Y.1
Tuttle, M.R.2
-
18
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
D. Hughes and V. Shmatikov, Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security 12(1) (2004), 3-36.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
19
-
-
33645585170
-
PRISM: Probabilistic symbolic model checker
-
P. Kemper, ed., Available as Technical Report 760/2001, University of Dortmund
-
M. Kwiatkowska, G. Norman and D. Parker, PRISM: Probabilistic symbolic model checker, in: Proc. Tools Session of Aachen 2001 International Multiconference on Measurement, Modelling and Evaluation of Computer-Communication Systems, P. Kemper, ed., 2001, pp. 7-12. Available as Technical Report 760/2001, University of Dortmund.
-
(2001)
Proc. Tools Session of Aachen 2001 International Multiconference on Measurement, Modelling and Evaluation of Computer-communication Systems
, pp. 7-12
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
20
-
-
0036312325
-
Hordes: A multicast based protocol for anonymity
-
B.N. Levine and C. Shields, Hordes: A multicast based protocol for anonymity, Journal of Computer Security 10(3) (2002), 213-240.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
21
-
-
0003630836
-
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York
-
R. Milner, A Calculus of Communicating Systems, Lecture Notes in Computer Science, Vol. 92, Springer-Verlag, Berlin/New York, 1980.
-
(1980)
A Calculus of Communicating Systems
, vol.92
-
-
Milner, R.1
-
22
-
-
0346338341
-
Common knowledge and update in finite environments
-
R. van der Meyden, Common knowledge and update in finite environments, Information and Computation 140(2) (1998), 115-157.
-
(1998)
Information and Computation
, vol.140
, Issue.2
, pp. 115-157
-
-
Van Der Meyden, R.1
-
24
-
-
84937564790
-
Anonymity, unobservability, and pseudeonymity: A proposal for terminology
-
Springer-Verlag, New York
-
A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudeonymity: a proposal for terminology, in: International Workshop on Designing Privacy Enhancing Technologies, Springer-Verlag, New York, 2001, pp. 1-9.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
28
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Springer-Verlag, Berlin/New York
-
A. Serjantov and G. Danezis, Towards an information theoretic metric for anonymity, in: Proc. Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, eds, Volume 2482 of Lecture Notes in Computer Science, Springer-Verlag, Berlin/New York, 2002, pp. 41-53.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
33
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J. Thayer, J.C. Herzog and J.D. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
|