-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, September 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. of Cryptology, 15(2): 103-127, 2002.
-
(2002)
J. of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
41549112213
-
Cryptographically-masked flows
-
Chalmers University of Technology, June
-
A. Askarov, D. Hedin, and A. Sabelfeld. Cryptographically-masked flows. Technical report, Chalmers University of Technology, June 2006. Located at http://www.cs.chalmers.se/~aaskarov/sas06full.pdf.
-
(2006)
Technical Report
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
4
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Proc. European Symp. on Research in Computer Security, Springer-Verlag, September
-
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proc. European Symp. on Research in Computer Security, volume 3679 of LNCS, pages 197-221. Springer-Verlag, September 2005.
-
(2005)
LNCS
, vol.3679
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
5
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology- Crypto 98, January
-
M. Bellare, A. Desa, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology- Crypto 98, volume 1462 of LNCS, pages 26-46, January 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-46
-
-
Bellare, M.1
Desa, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology - Asiacrypt 2000, January
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - Asiacrypt 2000, volume 1976 of LNCS, pages 531-545, January 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
7
-
-
35248822352
-
Encryption-scheme security in the presence of key-dependent messages
-
Selected Areas in Cryptography, Springer-Verlag, August
-
J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In Selected Areas in Cryptography, volume 2595 of LNCS, pages 62-75. Springer-Verlag, August 2002.
-
(2002)
LNCS
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
8
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1): 18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
12
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
July
-
M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
13
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
15
-
-
35248815514
-
On the secure implementation of security protocols
-
Proc. European Symp. on Programming Springer-Verlag, April
-
P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
18
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the picalculus
-
number 3653 in LNCS, Springer-Verlag, August
-
A. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the picalculus. In Proc. CONCUR'05, number 3653 in LNCS, pages 186-201. Springer-Verlag, August 2005.
-
(2005)
Proc. CONCUR'05
, pp. 186-201
-
-
Gordon, A.1
Jeffrey, A.2
-
19
-
-
33749864317
-
Declassification with cryptographic functions in a security-typed language
-
Network and Security Center, Department of Computer Science, Pennsylvania State University, May
-
B. Hicks, D. King, and P. McDaniel. Declassification with cryptographic functions in a security-typed language. Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005.
-
(2005)
Technical Report
, vol.NAS-TR-0004-2005
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
-
20
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Proc. European Symp. on Programming, Springer-Verlag, April
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
21
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Proc. European Symp. on Programming, Springer-Verlag, April
-
P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
22
-
-
26844509701
-
A type system for computationally secure information flow
-
Proc. Fundamentals of Computation Theory, August
-
P. Laud and V. Vene. A type system for computationally secure information flow. In Proc. Fundamentals of Computation Theory, volume 3623 of LNCS, pages 365-377, August 2005.
-
(2005)
LNCS
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
23
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
November
-
P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In ACM Conference on Computer and Communications Security, pages 112-121, November 1998.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
24
-
-
0023829319
-
Noninterference and the composability of security properties
-
May
-
D. McCullough. Noninterference and the composability of security properties. In Proc. IEEE Symp. on Security and Privacy, pages 177-186, May 1988.
-
(1988)
Proc. IEEE Symp. on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
25
-
-
84945290421
-
Probabilistic polynomial-time process calculus and security protocol analysis
-
Proc. European Symp. on Programming, Springer-Verlag, April
-
J. C. Mitchell. Probabilistic polynomial-time process calculus and security protocol analysis. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 23-29. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
, pp. 23-29
-
-
Mitchell, J.C.1
-
28
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security (ISSS'03), Springer-Verlag, October
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
30
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon. A mathematical theory of communication. Bell System Tech. J., 27:623-656, 1948.
-
(1948)
Bell System Tech. J.
, vol.27
, pp. 623-656
-
-
Shannon, C.E.1
-
34
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|