-
2
-
-
3042641709
-
-
http://www.anonymizer.com.
-
-
-
-
4
-
-
21844505024
-
Model checking of probabilistic and nondeterministic systems
-
Springer-Verlag
-
A. Bianco and L. de Alfaro, Model checking of probabilistic and nondeterministic systems, in: Proc. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Volume 1026 of LNCS. Springer-Verlag, 1995, pp. 499-513.
-
(1995)
Proc. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Volume 1026 of LNCS
, vol.1026
, pp. 499-513
-
-
Bianco, A.1
De Alfaro, L.2
-
5
-
-
0032131465
-
Model checking for a probabilistic branching time logic with fairness
-
C. Baier and M. Kwiatkowska, Model checking for a probabilistic branching time logic with fairness, Distributed Computing 11(3) (1998), 125-155.
-
(1998)
Distributed Computing
, vol.11
, Issue.3
, pp. 125-155
-
-
Baier, C.1
Kwiatkowska, M.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0039334690
-
Verifying security protocols with Brutus
-
E.M. Clarke, S. Jha and W. Marrero, Verifying security protocols with Brutus, ACM Transactions in Software Engineering Methodology 9(4) (2000), 443-487.
-
(2000)
ACM Transactions in Software Engineering Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
9
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Springer-Verlag
-
I. Clarke, O. Sandberg, B. Wiley and T.W. Hong, Freenet: A distributed anonymous information storage and retrieval system, in: Proc. International Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of LNCS, Springer-Verlag, 2001, pp. 46-66.
-
(2001)
Proc. International Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of LNCS
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
11
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J.W. Gray, Toward a mathematical foundation for information flow security, J. Computer Security 1(3) (1992), 255-294.
-
(1992)
J. Computer Security
, vol.1
, Issue.3
, pp. 255-294
-
-
Gray, J.W.1
-
12
-
-
0003096318
-
A logic for reasoning about time and probability
-
H. Hansson and B. Jonsson, A logic for reasoning about time and probability, Formal Aspects of Computing 6(5) (1994), 512-535.
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.5
, pp. 512-535
-
-
Hansson, H.1
Jonsson, B.2
-
14
-
-
3042591312
-
PRISM: Probabilistic symbolic model checker
-
University of Dortmund, September
-
M. Kwiatkowska, G. Norman and D. Parker, PRISM: Probabilistic symbolic model checker, Technical Report 760/2001, University of Dortmund, September 2001. Also in: Proc. PAPM/PROBMIV 2001 Tools Session.
-
(2001)
Technical Report
, vol.760
, Issue.2001
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
15
-
-
33645670147
-
-
M. Kwiatkowska, G. Norman and D. Parker, PRISM: Probabilistic symbolic model checker, Technical Report 760/2001, University of Dortmund, September 2001. Also in: Proc. PAPM/PROBMIV 2001 Tools Session.
-
Proc. PAPM/PROBMIV 2001 Tools Session
-
-
-
16
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Springer-Verlag
-
P. Lincoln, J.C. Mitchell, M. Mitchell and A. Scedrov, Probabilistic polynomial-time equivalence and security analysis, in: Proc. World Congress on Formal Methods, Volume 1708 of LNCS, Springer-Verlag, 1999, pp. 776-793.
-
(1999)
Proc. World Congress on Formal Methods, Volume 1708 of LNCS
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
18
-
-
0020138113
-
Reasoning with time and chance
-
D. Lehmann and S. Shelah, Reasoning with time and chance, Information and Control 53(3) (1982), 165-198.
-
(1982)
Information and Control
, vol.53
, Issue.3
, pp. 165-198
-
-
Lehmann, D.1
Shelah, S.2
-
19
-
-
3042641707
-
-
Private communication
-
D. Malkhi, Private communication, 2001.
-
(2001)
-
-
Malkhi, D.1
-
21
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson, The inductive approach to verifying cryptographic protocols, J. Computer Security 6(1) (1998), 85-128.
-
(1998)
J. Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
26
-
-
84949756689
-
CSP and anonymity
-
Springer-Verlag
-
S. Schneider and A. Sidiroupoulos, CSP and anonymity, in: Proc. ESORICS, Volume 1146 of LNCS, Springer-Verlag, 1996, pp. 198-218.
-
(1996)
Proc. ESORICS, Volume 1146 of LNCS
, vol.1146
, pp. 198-218
-
-
Schneider, S.1
Sidiroupoulos, A.2
-
27
-
-
84924758404
-
Group principals and the formalization of anonymity
-
Springer-Verlag
-
P. Syverson and S. Stubblebine, Group principals and the formalization of anonymity, in: Proc. World Congress on Formal Methods, Volume 1708 of LNCS, Springer-Verlag, 1999, pp. 814-833.
-
(1999)
Proc. World Congress on Formal Methods, Volume 1708 of LNCS
, vol.1780
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
|