-
6
-
-
35248895872
-
Mental poker revisited
-
Proc. Cryptography and Coding IMA International Conference. Springer-Verlag, December
-
A. Barnett and N. P. Smart. Mental poker revisited. In Proc. Cryptography and Coding IMA International Conference, volume 2898 of LNCS, pages 370-383. Springer-Verlag, December 2003.
-
(2003)
LNCS
, vol.2898
, pp. 370-383
-
-
Barnett, A.1
Smart, N.P.2
-
8
-
-
0347526084
-
Practical mental poker without a TTP based on homomorphic encryption
-
Progress in Cryptology-Indocrypt. Springer-Verlag, December
-
J. Castellà-Roca, J. Domingo-Ferrer, A. Riera, and J. Borrell. Practical mental poker without a TTP based on homomorphic encryption. In Progress in Cryptology-Indocrypt, volume 2904 of LNCS, pages 280-294. Springer-Verlag, December 2003.
-
(2003)
LNCS
, vol.2904
, pp. 280-294
-
-
Castellà-Roca, J.1
Domingo-Ferrer, J.2
Riera, A.3
Borrell, J.4
-
12
-
-
84945299487
-
A secure poker protocol that minimizes the effect of players coalitions
-
Advances in Cryptology: Crypto'85. Springer-Verlag
-
C. Crépeau. A secure poker protocol that minimizes the effect of players coalitions. In Advances in Cryptology: Crypto'85, volume 218 of LNCS, pages 73-86. Springer-Verlag, 1986.
-
(1986)
LNCS
, vol.218
, pp. 73-86
-
-
Crépeau, C.1
-
13
-
-
84945299518
-
A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face
-
Advances in Cryptology: Crypto'86. Springer-Verlag
-
C. Crépeau. A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face. In Advances in Cryptology: Crypto'86, volume 263 of LNCS, pages 239-247. Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 239-247
-
-
Crépeau, C.1
-
14
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
July
-
M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5);236-243, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
16
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
0030577321
-
A new privacy homomorphism and applications
-
J. Domingo-Ferrer. A new privacy homomorphism and applications. Information Processing Letters, 60(5):277-282, 1996.
-
(1996)
Information Processing Letters
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
19
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of security properties (part I: Information flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
20
-
-
35248815514
-
On the secure implementation of security protocols
-
Proc. European Symp. on Programming. Springer-Verlag, April
-
P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
22
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
S. Goldwasser and S. Micali. Probabilistic encryption and how to play mental poker keeping secret all partial information. In Proc. ACM Symp. Theory of Computing, pages 365-377, 1982.
-
(1982)
Proc. ACM Symp. Theory of Computing
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
23
-
-
85084163781
-
Lessons learned in implementing and deploying crypto software
-
August
-
P. Gutmann. Lessons learned in implementing and deploying crypto software. In Proc. USENIX Security Symp., pages 315-325, August 2002.
-
(2002)
Proc. USENIX Security Symp.
, pp. 315-325
-
-
Gutmann, P.1
-
26
-
-
0142157005
-
Bridging model-based and language-based security
-
Proc. European Symp. on Research in Computer Security. Springer-Verlag, October
-
R. Heldal and F. Hultin. Bridging model-based and language-based security. In Proc. European Symp. on Research in Computer Security, volume 2808 of LNCS, pages 235-252. Springer-Verlag, October 2003.
-
(2003)
LNCS
, vol.2808
, pp. 235-252
-
-
Heldal, R.1
Hultin, F.2
-
28
-
-
0030645350
-
Reshufflable and laziness tolerant mental card game protocol
-
K. Kurosawa, K. Katayama, and W. Ogata. Reshufflable and laziness tolerant mental card game protocol. IEICE Transactions, E80-A(1):72-78, 1997.
-
(1997)
IEICE Transactions
, vol.E80-A
, Issue.1
, pp. 72-78
-
-
Kurosawa, K.1
Katayama, K.2
Ogata, W.3
-
29
-
-
85043768965
-
General public key residue cryptosystems and mental poker protocols
-
Advances in Cryptology: EuroCrypto'90. Springer-Verlag
-
K. Kurosawa, Y. Katayama, W. Ogata, and S. Tsujii. General public key residue cryptosystems and mental poker protocols. In Advances in Cryptology: EuroCrypto'90, volume 473 of LNCS, pages 374-388. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.473
, pp. 374-388
-
-
Kurosawa, K.1
Katayama, Y.2
Ogata, W.3
Tsujii, S.4
-
32
-
-
35048815139
-
Controlled downgrading based on intransitive (non)interference
-
Proc. Asian Symp. on Programming Languages and Systems. Springer-Verlag, November
-
H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
-
(2004)
LNCS
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
36
-
-
0005260169
-
-
Software release July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2004.
-
(2001)
Jif: Java Information Flow.
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
37
-
-
0348017041
-
Information flow inference for ML
-
January
-
F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, January 2003.
-
(2003)
ACM TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
38
-
-
0012886288
-
Mathematical models of computer security-tutorial lectures
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
-
P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
40
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security (ISSS'03). Springer-Verlag, October
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
45
-
-
33646091639
-
-
Software release July
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml/, July 2003.
-
(2003)
The Flow Caml System
-
-
Simonet, V.1
-
49
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
October
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In Proc. ACM Symp. on Operating System Principles, pages 1-14, October 2001.
-
(2001)
Proc. ACM Symp. on Operating System Principles
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
50
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
May
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In Proc. IEEE Symp. on Security and Privacy, pages 236-250, May 2003.
-
(2003)
Proc. IEEE Symp. on Security and Privacy
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|