메뉴 건너뛰기




Volumn 3679 LNCS, Issue , 2005, Pages 197-221

Security-typed languages for implementation of cryptographic protocols: A case study

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33646080360     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11555827_12     Document Type: Conference Paper
Times cited : (36)

References (51)
  • 6
    • 35248895872 scopus 로고    scopus 로고
    • Mental poker revisited
    • Proc. Cryptography and Coding IMA International Conference. Springer-Verlag, December
    • A. Barnett and N. P. Smart. Mental poker revisited. In Proc. Cryptography and Coding IMA International Conference, volume 2898 of LNCS, pages 370-383. Springer-Verlag, December 2003.
    • (2003) LNCS , vol.2898 , pp. 370-383
    • Barnett, A.1    Smart, N.P.2
  • 8
    • 0347526084 scopus 로고    scopus 로고
    • Practical mental poker without a TTP based on homomorphic encryption
    • Progress in Cryptology-Indocrypt. Springer-Verlag, December
    • J. Castellà-Roca, J. Domingo-Ferrer, A. Riera, and J. Borrell. Practical mental poker without a TTP based on homomorphic encryption. In Progress in Cryptology-Indocrypt, volume 2904 of LNCS, pages 280-294. Springer-Verlag, December 2003.
    • (2003) LNCS , vol.2904 , pp. 280-294
    • Castellà-Roca, J.1    Domingo-Ferrer, J.2    Riera, A.3    Borrell, J.4
  • 12
    • 84945299487 scopus 로고
    • A secure poker protocol that minimizes the effect of players coalitions
    • Advances in Cryptology: Crypto'85. Springer-Verlag
    • C. Crépeau. A secure poker protocol that minimizes the effect of players coalitions. In Advances in Cryptology: Crypto'85, volume 218 of LNCS, pages 73-86. Springer-Verlag, 1986.
    • (1986) LNCS , vol.218 , pp. 73-86
    • Crépeau, C.1
  • 13
    • 84945299518 scopus 로고
    • A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face
    • Advances in Cryptology: Crypto'86. Springer-Verlag
    • C. Crépeau. A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face. In Advances in Cryptology: Crypto'86, volume 263 of LNCS, pages 239-247. Springer-Verlag, 1987.
    • (1987) LNCS , vol.263 , pp. 239-247
    • Crépeau, C.1
  • 14
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • July
    • M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5);236-243, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 16
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 17
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • J. Domingo-Ferrer. A new privacy homomorphism and applications. Information Processing Letters, 60(5):277-282, 1996.
    • (1996) Information Processing Letters , vol.60 , Issue.5 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 19
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part I: Information flow)
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
    • R. Focardi and R. Gorrieri. Classification of security properties (part I: Information flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 20
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Proc. European Symp. on Programming. Springer-Verlag, April
    • P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 22
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • S. Goldwasser and S. Micali. Probabilistic encryption and how to play mental poker keeping secret all partial information. In Proc. ACM Symp. Theory of Computing, pages 365-377, 1982.
    • (1982) Proc. ACM Symp. Theory of Computing , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 23
    • 85084163781 scopus 로고    scopus 로고
    • Lessons learned in implementing and deploying crypto software
    • August
    • P. Gutmann. Lessons learned in implementing and deploying crypto software. In Proc. USENIX Security Symp., pages 315-325, August 2002.
    • (2002) Proc. USENIX Security Symp. , pp. 315-325
    • Gutmann, P.1
  • 26
    • 0142157005 scopus 로고    scopus 로고
    • Bridging model-based and language-based security
    • Proc. European Symp. on Research in Computer Security. Springer-Verlag, October
    • R. Heldal and F. Hultin. Bridging model-based and language-based security. In Proc. European Symp. on Research in Computer Security, volume 2808 of LNCS, pages 235-252. Springer-Verlag, October 2003.
    • (2003) LNCS , vol.2808 , pp. 235-252
    • Heldal, R.1    Hultin, F.2
  • 28
    • 0030645350 scopus 로고    scopus 로고
    • Reshufflable and laziness tolerant mental card game protocol
    • K. Kurosawa, K. Katayama, and W. Ogata. Reshufflable and laziness tolerant mental card game protocol. IEICE Transactions, E80-A(1):72-78, 1997.
    • (1997) IEICE Transactions , vol.E80-A , Issue.1 , pp. 72-78
    • Kurosawa, K.1    Katayama, K.2    Ogata, W.3
  • 29
    • 85043768965 scopus 로고
    • General public key residue cryptosystems and mental poker protocols
    • Advances in Cryptology: EuroCrypto'90. Springer-Verlag
    • K. Kurosawa, Y. Katayama, W. Ogata, and S. Tsujii. General public key residue cryptosystems and mental poker protocols. In Advances in Cryptology: EuroCrypto'90, volume 473 of LNCS, pages 374-388. Springer-Verlag, 1991.
    • (1991) LNCS , vol.473 , pp. 374-388
    • Kurosawa, K.1    Katayama, Y.2    Ogata, W.3    Tsujii, S.4
  • 31
  • 32
    • 35048815139 scopus 로고    scopus 로고
    • Controlled downgrading based on intransitive (non)interference
    • Proc. Asian Symp. on Programming Languages and Systems. Springer-Verlag, November
    • H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
    • (2004) LNCS , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 37
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • January
    • F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, January 2003.
    • (2003) ACM TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 38
    • 0012886288 scopus 로고    scopus 로고
    • Mathematical models of computer security-tutorial lectures
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
    • P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 1-62
    • Ryan, P.1
  • 40
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security (ISSS'03). Springer-Verlag, October
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 45
    • 33646091639 scopus 로고    scopus 로고
    • Software release July
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml/, July 2003.
    • (2003) The Flow Caml System
    • Simonet, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.