-
1
-
-
14844334491
-
Deciding knowledge in security protocols under equational theories
-
M.Abadi and V.Cortier: Deciding Knowledge in Security Protocols under Equational Theories. In: ICALP (2004)
-
(2004)
ICALP
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
35048895107
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M.Abadi and P.Rogaway: Reconciling two Views of Cryptography (The computational soundness of formal encryption). In: IFIP TCS2000 (2000)
-
(2000)
IFIP TCS2000
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33745641197
-
A logic of communication in a hostile environment
-
P.Bieber: A Logic of Communication in a Hostile Environment. In: CSFW (1990)
-
(1990)
CSFW
-
-
Bieber, P.1
-
5
-
-
70349916931
-
Modelling dynamic opacity using petri Nets with silent actions
-
J.W.Bryans, M.Koutny and P.Y.A.Ryan: Modelling Dynamic Opacity using Petri Nets with Silent Actions. In: FAST (2004)
-
(2004)
FAST
-
-
Bryans, J.W.1
Koutny, M.2
Ryan, P.Y.A.3
-
9
-
-
0007441079
-
The minimal coverability graph for petri nets
-
A.Finkel: The Minimal Coverability Graph for Petri Nets. LNCS 674 (1993)
-
(1993)
LNCS
, vol.674
-
-
Finkel, A.1
-
10
-
-
33745637346
-
A taxonomy of trace-based security properties for CCS
-
R.Focardi and R.Gorrieri: A Taxonomy of Trace-Based Security Properties for CCS. In: CSFW (1994)
-
(1994)
CSFW
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
3042668408
-
Classification of security properties: Information flow
-
R.Focardi and R.Gorrieri: Classification of Security Properties: Information flow. LNCS 2171 (2000)
-
(2000)
LNCS
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
78649489194
-
Probabilistic opacity for a passive adversary and its application to chaum's voting scheme
-
Y. Lakhnech and L. Mazaré: Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme. Verimag Technical Report 2005-04, (2005).
-
(2005)
Verimag Technical Report
, vol.2005
, Issue.4
-
-
Lakhnech, Y.1
Mazaré, L.2
-
14
-
-
33646018220
-
Anonymity and information hiding in multiagent systems
-
J.Y.Halpern and K.O'Neill: Anonymity and Information Hiding in Multiagent Systems. In: CSFW (2003)
-
(2003)
CSFW
-
-
Halpern, J.Y.1
O'Neill, K.2
-
16
-
-
13544269120
-
Using unification for opacity properties
-
L.Mazaré: Using Unification For Opacity Properties. In: WITS (2004)
-
(2004)
WITS
-
-
Mazaré, L.1
-
17
-
-
33745659538
-
A logic of knowledge and belief for reasoning about security
-
L.Moser: A Logic of Knowledge and Belief for Reasoning about Security. In: CSFW (1989)
-
(1989)
CSFW
-
-
Moser, L.1
-
19
-
-
0006010789
-
A calculus of information flow
-
C.O'Halloran: A Calculus of Information Flow. In: ESORICS (1990)
-
(1990)
ESORICS
-
-
O'Halloran, C.1
-
21
-
-
0003912011
-
Lectures on petri nets
-
W.Reisig and G.Rozenberg (Eds.)
-
W.Reisig and G.Rozenberg (Eds.): Lectures on Petri Nets. LNCS 1491 & 1492 (1998)
-
(1998)
LNCS
, vol.1491-1492
-
-
-
22
-
-
84949243805
-
Mathematical models of COmputer security
-
P.Y.A.Ryan: Mathematical Models of Computer Security. LNCS 2171 (2000)
-
(2000)
LNCS
, vol.2171
-
-
Ryan, P.Y.A.1
|