-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi, M.: Secrecy by Typing in Security Protocols. Journal of the ACM 46 (1999) 749-786
-
(1999)
Journal of the ACM
, vol.46
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theoretical Computer Science 298 (2003) 387-415
-
(2003)
Theoretical Computer Science
, vol.298
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148 (1999) 1-70
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
4
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
proc. of TACS 2001
-
Abadi, M., Jürjens, J.: Formal Eavesdropping and Its Computational Interpretation. In proc. of TACS 2001 (LNCS 2215), pages 82-94
-
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
5
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
proc. of the International Conference IFIP TCS 2000
-
Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In proc. of the International Conference IFIP TCS 2000 (LNCS 1872), pages 3-22
-
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
6
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
Backes, M., Pfitzmann, B.: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. In proc. of CSFW 2004, pages 204-218
-
Proc. of CSFW 2004
, pp. 204-218
-
-
Backes, M.1
Pfitzmann, B.2
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In proc. of FOCS'01, pages 136-145
-
Proc. of FOCS'01
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.: A Lattice Model of Secure Information Flow. Communications of the ACM 19 (1976) 236-243
-
(1976)
Communications of the ACM
, vol.19
, pp. 236-243
-
-
Denning, D.1
-
9
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D., Denning, P.: Certification of Programs for Secure Information Flow. Communications of the ACM 20 (1977) 504-513
-
(1977)
Communications of the ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
11
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
proc of. ESOP 2001
-
Laud, P.: Semantics and Program Analysis of Computationally Secure Information Flow. In proc of. ESOP 2001 (LNCS 2028), pages 77-91
-
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
12
-
-
28144443023
-
Encryption cycles and two views of cryptography
-
Laud, P.: Encryption Cycles and Two Views of Cryptography. In proc. of Nordsee 2002, pages 85-100
-
Proc. of Nordsee 2002
, pp. 85-100
-
-
Laud, P.1
-
13
-
-
35248840989
-
Handling encryption in analyses for secure information flow
-
proc. of ESOP 2003
-
Laud, P.: Handling Encryption in Analyses for Secure Information Flow. In proc. of ESOP 2003 (LNCS 2618), pages 159-173
-
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
14
-
-
26844509269
-
A type system for computationally secure information flow
-
Cybernetica AS, March 7th
-
Laud, P., Vene, V.: A Type System for Computationally Secure Information Flow. Tech. Report IT-LU-O-043-050307, Cybernetica AS, March 7th 2005.
-
(2005)
Tech. Report
, vol.IT-LU-O-043-050307
-
-
Laud, P.1
Vene, V.2
-
15
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A Probabilistic Poly-Time Framework for Protocol Analysis. In proc. of ACM CCS'98, pages 112-121
-
Proc. of ACM CCS'98
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
proc. of the World Congress on Formal Methods in the Development of Computing Systems'99
-
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: Probabilistic Polynomial-Time Equivalence and Security Analysis. In proc. of the World Congress on Formal Methods in the Development of Computing Systems'99 (LNCS 1708), pages 776-793
-
LNCS
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
18
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In proc. of POPL'99, pages 228-241
-
Proc. of POPL'99
, pp. 228-241
-
-
Myers, A.C.1
-
20
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In proc. of IEEE S&P 2001, pages 184-200
-
Proc. of IEEE S&P 2001
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
21
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
Smith, G., Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In proc. of POPL'98, pages 355-364
-
Proc. of POPL'98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
22
-
-
0033683194
-
Secure introduction of one-way functions
-
Volpano, D.: Secure Introduction of One-way Functions. In proc. of CSFW'00, pages 246-254
-
Proc. of CSFW'00
, pp. 246-254
-
-
Volpano, D.1
-
23
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A Sound Type System for Secure Flow Analysis. Journal of Computer Security 4 (1996) 167-187
-
(1996)
Journal of Computer Security
, vol.4
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
24
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
Volpano, D.M., Smith, G.: Eliminating Covert Flows with Minimum Typings. In proc. of CSFW'97, pages 156-169
-
Proc. of CSFW'97
, pp. 156-169
-
-
Volpano, D.M.1
Smith, G.2
-
25
-
-
0031633213
-
Probabilistic noninterference in a concurrent language
-
Volpano, D., Smith, G.: Probabilistic Noninterference in a Concurrent Language. In proc. of CSFW'98, pages 34-43
-
Proc. of CSFW'98
, pp. 34-43
-
-
Volpano, D.1
Smith, G.2
-
26
-
-
0033705210
-
Verifying secrets and relative secrecy
-
Volpano, D., Smith, G.: Verifying Secrets and Relative Secrecy. In: proc. of POPL 2000, pages 268-276
-
Proc. of POPL 2000
, pp. 268-276
-
-
Volpano, D.1
Smith, G.2
-
27
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Yao, A.: Theory and applications of trapdoor functions (extended abstract). In proc. of FOCS'82, pages 80-91
-
Proc. of FOCS'82
, pp. 80-91
-
-
Yao, A.1
|