-
1
-
-
33750434740
-
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, Technical Report RZ 2976, IBM Research, 1997.
-
-
-
-
2
-
-
0031650188
-
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proc. IEEE Symp. on Research in Security and Privacy, IEEE, New York, 1998, pp. 86-99.
-
-
-
-
3
-
-
0035751922
-
-
R. Chadha, M. Kanovich, A. Scedrov, Inductive methods and contract-signing protocols, in: Eighth ACM Conf. on Computer and Communications Security, ACM Press, New York, 2001, pp. 176-185.
-
-
-
-
4
-
-
4944247375
-
-
R. Chadha, S. Kremer, A. Scedrov, Formal analysis of multi-party contract signing, in: Proc. 17th IEEE Computer Security Foundations Workshop, IEEE, New York, 2004, pp. 266-279.
-
-
-
-
5
-
-
35248877959
-
-
R. Chadha, J.C. Mitchell, A. Scedrov, V. Shmatikov, Contract signing, optimism, and advantage, in: 14th International Conference on Concurrency Theory (CONCUR '03), Lecture Notes in Computer Science, Vol. 2761, Springer, Berlin, 2003.
-
-
-
-
6
-
-
24144442872
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, A derivation system and compositional logic for security protocols, J. Comput. Security 13 (3) (2005) 423-482.
-
-
-
-
7
-
-
34548864135
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, A derivation system for security protocols and its logical formalization, in: Proc. 16th IEEE Computer Security Foundations Workshop, IEEE, New York, 2003, pp. 109-125.
-
-
-
-
8
-
-
2642548302
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition (Extended abstract), in: Proc. of ACM Workshop on Formal Methods in Security Engineering, 2003, pp. 11-23.
-
-
-
-
9
-
-
4944226639
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Abstraction and refinement in protocol derivation, in: Proc. 17th IEEE Computer Security Foundations Workshop, IEEE, New York, 2004, pp. 30-45.
-
-
-
-
10
-
-
33750448523
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: Proc. 19th Annu. Conf. on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, Vol. 83, 2004.
-
-
-
-
11
-
-
26444565771
-
-
A. Datta, A. Derek, J.C. Mitchell, V. Shmatikov, M. Turuani, Probabilistic polynomial-time semantics for a protocol security logic, in: Proc. 32nd Internat. Colloq. on Automata, Languages and Programming (ICALP '05), Lecture Notes in Computer Science, Springer, Berlin, 2005.
-
-
-
-
12
-
-
0034834930
-
-
N. Durgin, J.C. Mitchell, D. Pavlovic, A compositional logic for protocol correctness, in: Proc. 14th IEEE Computer Security Foundations Workshop, IEEE, New York, 2001, pp. 241-255.
-
-
-
-
13
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. J. Comput. Security 11 (2003) 677-721
-
(2003)
J. Comput. Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
14
-
-
33750482466
-
-
S. Even, Y. Yacobi, Relations among public key signature schemes, Technical Report 175, Computer Science Department, Technion, Israel, 1980.
-
-
-
-
15
-
-
84957060126
-
-
J.A. Garay, M. Jakobsson, P. MacKenzie, Abuse-free optimistic contract signing, in: Proc. 19th Annu. Internat. Cryptology Conf. on Advances in Cryptology, Springer, Berlin, 1999, pp. 449-466.
-
-
-
-
16
-
-
33745770376
-
-
C. He, M. Sundararajan, A. Datta, A. Derek, J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS. in: CCS '05: Proc. 12th ACM Conf. on Computer and Communications Security, 2005.
-
-
-
-
17
-
-
0036836682
-
An intensive survey of non-repudiation protocols
-
Kremer S., Markowitch O., and Zhou J. An intensive survey of non-repudiation protocols. Comput. Commun. 25 17 (2002) 1606-1621
-
(2002)
Comput. Commun.
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
18
-
-
84948779843
-
-
S. Kremer, J.-F. Raskin, Game analysis of abuse-free contract signing, in: Proc. 15th IEEE Computer Security Foundations Workshop, IEEE, New York, 2002, pp. 206-220.
-
-
-
-
20
-
-
84959047912
-
-
O. Markowitch, S. Kremer, A multi-party optimistic non-repudiation protocol, in: Proc. Third Internat. Conf. on Information Security and Cryptology, Springer, Berlin, 2001, pp. 109-122.
-
-
-
-
21
-
-
84949206560
-
-
O. Markowitch, S. Saeednia, Optimistic fair exchange with transparent signature recovery, in: Proc. Fifth Internat. Conf. on Financial Cryptography, Springer, Berlin, 2001, pp. 339-350.
-
-
-
-
22
-
-
33750462245
-
-
H. Pagnia, F.C. Gärtner, On the impossibility of fair exchange without a trusted third party, Technical Report TUD-BS-1999-02, Department of Computer Science, Darmstadt University of Technology, Darmstadt, Germany, 1999.
-
-
-
-
23
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov V., and Mitchell J.C. Finite-state analysis of two contract signing protocols. Theoret. Comput. Sci. 283 2 (2002) 419-450
-
(2002)
Theoret. Comput. Sci.
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
24
-
-
34547265412
-
-
H. Vogt, Asynchronous optimistic fair exchange based on revocable items, in: Proc. Seventh Internat. Conf. on Financial Cryptography, Springer, Berlin, 2003, pp. 208-222.
-
-
-
-
25
-
-
84961312272
-
-
J. Zhou, R. Deng, F. Bao, Evolution of fair non-repudiation with TTP, in: Proc. Fourth Australasian Conf. on Information Security and Privacy, Lecture Notes in Computer Science, Vol. 1587, Springer, Berlin, 1999, pp. 258-269.
-
-
-
|