-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
0004260840
-
-
Number 53 in Cambridge Tracts in Theoretical Computer Science. Cambridge University Press
-
P. Blackburn, M. de Rijke, and Y. Venema. Modal Logic. Number 53 in Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 2001.
-
(2001)
Modal Logic
-
-
Blackburn, P.1
De Rijke, M.2
Venema, Y.3
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
4
-
-
33744479345
-
Freenet; A distributed anonymous information storage and retrieval system
-
July
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet; A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46-66, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
8
-
-
0003730235
-
-
MIT Press, Cambridge, MA
-
R. Fagin, J. Halpern, Y. Moses, and M. Vardi. Reasoning About Knowledge. MIT Press, Cambridge, MA, 1995.
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.2
Moses, Y.3
Vardi, M.4
-
9
-
-
84955557456
-
Hiding routing information
-
R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding Routing Information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 137-150. Springer-Verlag, May 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
10
-
-
31844457258
-
Key compromise, strand spaces, and the authentication tests
-
Mathematical Foundations of Programming Semantics 17, Elsevier, Amsterdam
-
J. Guttman. Key compromise, strand spaces, and the authentication tests. In Mathematical Foundations of Programming Semantics 17, volume 47 of Electronic Notes in Theoretical Computer Science, pages 1-21. Elsevier, Amsterdam, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.47
, pp. 1-21
-
-
Guttman, J.1
-
13
-
-
31844446595
-
A formalization of anonymity and onion routing
-
Esorics 2004, Sophia Antipolis
-
S. Mauw, J. Verschuren, and E. de Vink. A formalization of anonymity and onion routing. In Esorics 2004, volume 3193 of Lecture Notes in Computer Science, pages 109-124, Sophia Antipolis, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 109-124
-
-
Mauw, S.1
Verschuren, J.2
De Vink, E.3
-
14
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
15
-
-
0008144259
-
-
Draft, version 0.22, July
-
A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft, version 0.22, July 2000.
-
(2000)
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
18
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3):355-377, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3
, pp. 355-377
-
-
Shmatikov, V.1
|