-
1
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
ICALP 2004, Springer
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In ICALP 2004, volume 3142 of LNCS, pages 46-58. Springer, 2004.
-
(2004)
LNCS
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM Press
-
M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, In POPL 2001, pages 104-115, ACM Press, 2001.
-
(2001)
POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
ACM Press
-
R. Chadha, M.I. Kanovich, and A.Scedrov. Inductive methods and contract-signing protocols. In CCS 2001, pages 176-185. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.I.2
Scedrov, A.3
-
5
-
-
4944247375
-
Formal analysis of multi-party contract signing
-
IEEE Computer Society Press
-
R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In CSFW 2004, pages 266-279. IEEE Computer Society Press, 2004.
-
(2004)
CSFW 2004
, pp. 266-279
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
6
-
-
35248877959
-
Contract signing, optimism, and advantage
-
CONCUR 8003, Springer
-
R. Chadha, J.C. Mitchell, A. Scedrov, and V. Shmatikov:. Contract Signing, Optimism, and Advantage. In CONCUR 8003, volume 2761 of LNCS, pages 361-377. Springer, 2003.
-
(2003)
LNCS
, vol.2761
, pp. 361-377
-
-
Chadha, R.1
Mitchell, J.C.2
Scedrov, A.3
Shmatikov, V.4
-
7
-
-
26444458330
-
Combining intruder theories
-
ICALP 2005, Springer
-
Y. Chevalier and M. Rusinowitch. Combining Intruder Theories. In ICALP 2005, volume 3580 of LNCS, pages 639-651. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
9
-
-
84957060126
-
Abuse-free optimistic contract signing
-
CRYPTO'99, Springer-Verlag
-
J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In CRYPTO'99, volume 1666 of LNCS, pages 449-466. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
10
-
-
24144437134
-
Deciding properties of contract-signing protocols
-
STACS 2005, Springer-Verlag
-
D. Kähler, R. Küsters, and Th. Wilke. Deciding Properties of Contract-Signing Protocols. In STACS 2005, volume 3404 of LNCS, pages 158-169. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3404
, pp. 158-169
-
-
Kähler, D.1
Küsters, R.2
Wilke, T.3
-
11
-
-
84941162886
-
A Dolev-Yao-based definition of abus-free protocols
-
IFI 0607, CAU Kiel, Germany
-
D. Kähler, R. Küsters, and Th. Wilke. A Dolev-Yao-based Definition of Abus-free Protocols. Technical report, IFI 0607, CAU Kiel, Germany, 2006. Available from http://www.informatik.uni-kiel.de/reports/2006/ 0607.html
-
(2006)
Technical Report
-
-
Kähler, D.1
Küsters, R.2
Wilke, T.3
-
12
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
IEEE Computer Society
-
S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In CSFW 2002, pages 206-220. IEEE Computer Society, 2002.
-
(2002)
CSFW 2002
, pp. 206-220
-
-
Kremer, S.1
Raskin, J.-F.2
|