메뉴 건너뛰기




Volumn 4134 LNCS, Issue , 2006, Pages 353-369

Cryptographically-masked flows

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; FORMAL LOGIC; INFORMATION RETRIEVAL; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33749846305     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11823230_23     Document Type: Conference Paper
Times cited : (20)

References (34)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, September 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. of Cryptology, 15(2): 103-127, 2002.
    • (2002) J. of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 41549112213 scopus 로고    scopus 로고
    • Cryptographically-masked flows
    • Chalmers University of Technology, June
    • A. Askarov, D. Hedin, and A. Sabelfeld. Cryptographically-masked flows. Technical report, Chalmers University of Technology, June 2006. Located at http://www.cs.chalmers.se/~aaskarov/sas06full.pdf.
    • (2006) Technical Report
    • Askarov, A.1    Hedin, D.2    Sabelfeld, A.3
  • 4
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • Proc. European Symp. on Research in Computer Security, Springer-Verlag, September
    • A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proc. European Symp. on Research in Computer Security, volume 3679 of LNCS, pages 197-221. Springer-Verlag, September 2005.
    • (2005) LNCS , vol.3679 , pp. 197-221
    • Askarov, A.1    Sabelfeld, A.2
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology- Crypto 98, January
    • M. Bellare, A. Desa, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology- Crypto 98, volume 1462 of LNCS, pages 26-46, January 1998.
    • (1998) LNCS , vol.1462 , pp. 26-46
    • Bellare, M.1    Desa, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology - Asiacrypt 2000, January
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - Asiacrypt 2000, volume 1976 of LNCS, pages 531-545, January 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 7
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Selected Areas in Cryptography, Springer-Verlag, August
    • J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In Selected Areas in Cryptography, volume 2595 of LNCS, pages 62-75. Springer-Verlag, August 2002.
    • (2002) LNCS , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 11
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 12
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • July
    • M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 13
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 15
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Proc. European Symp. on Programming Springer-Verlag, April
    • P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 18
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the picalculus
    • number 3653 in LNCS, Springer-Verlag, August
    • A. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the picalculus. In Proc. CONCUR'05, number 3653 in LNCS, pages 186-201. Springer-Verlag, August 2005.
    • (2005) Proc. CONCUR'05 , pp. 186-201
    • Gordon, A.1    Jeffrey, A.2
  • 19
    • 33749864317 scopus 로고    scopus 로고
    • Declassification with cryptographic functions in a security-typed language
    • Network and Security Center, Department of Computer Science, Pennsylvania State University, May
    • B. Hicks, D. King, and P. McDaniel. Declassification with cryptographic functions in a security-typed language. Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005.
    • (2005) Technical Report , vol.NAS-TR-0004-2005
    • Hicks, B.1    King, D.2    McDaniel, P.3
  • 20
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Proc. European Symp. on Programming, Springer-Verlag, April
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 21
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Proc. European Symp. on Programming, Springer-Verlag, April
    • P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 22
    • 26844509701 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • Proc. Fundamentals of Computation Theory, August
    • P. Laud and V. Vene. A type system for computationally secure information flow. In Proc. Fundamentals of Computation Theory, volume 3623 of LNCS, pages 365-377, August 2005.
    • (2005) LNCS , vol.3623 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 24
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • May
    • D. McCullough. Noninterference and the composability of security properties. In Proc. IEEE Symp. on Security and Privacy, pages 177-186, May 1988.
    • (1988) Proc. IEEE Symp. on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 25
    • 84945290421 scopus 로고    scopus 로고
    • Probabilistic polynomial-time process calculus and security protocol analysis
    • Proc. European Symp. on Programming, Springer-Verlag, April
    • J. C. Mitchell. Probabilistic polynomial-time process calculus and security protocol analysis. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 23-29. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028 , pp. 23-29
    • Mitchell, J.C.1
  • 26
    • 33646177208 scopus 로고    scopus 로고
    • Enforcing robust declassification and qualified robustness
    • To appear
    • A. C. Myers, A. Sabelfeld, and S. Zdancewic. Enforcing robust declassification and qualified robustness. J. Computer Security, 2006. To appear.
    • (2006) J. Computer Security
    • Myers, A.C.1    Sabelfeld, A.2    Zdancewic, S.3
  • 28
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security (ISSS'03), Springer-Verlag, October
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 30
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon. A mathematical theory of communication. Bell System Tech. J., 27:623-656, 1948.
    • (1948) Bell System Tech. J. , vol.27 , pp. 623-656
    • Shannon, C.E.1
  • 34
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.