-
1
-
-
84943242087
-
Security analysis of a probabilistic non-repudiation protocol
-
Proc. Second Joint Int. Workshop on Process Algebm and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV), H. Hermanns and R. Segala, eds, Springer
-
A. Aldini and R. Gorrieri, Security analysis of a probabilistic non-repudiation protocol, in: Proc. Second Joint Int. Workshop on Process Algebm and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV), H. Hermanns and R. Segala, eds, Volume 2399 of LNCS, Springer, 2002, pp. 17-36.
-
(2002)
LNCS
, vol.2399
, pp. 17-36
-
-
Aldini, A.1
Gorrieri, R.2
-
4
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup and M. Waidner, Optimistic fair exchange of digital signatures, IEEE Selected Areas in Communications 18(4) (2000), 593-610.
-
(2000)
IEEE Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
0032131465
-
Model checking for a probabilistic branching time logic with fairness
-
C. Baier and M. Kwiatkowska, Model checking for a probabilistic branching time logic with fairness, Distributed Computing 11(3) (1998), 125-155.
-
(1998)
Distributed Computing
, vol.11
, Issue.3
, pp. 125-155
-
-
Baier, C.1
Kwiatkowska, M.2
-
6
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali and R. Rivest, A fair protocol for signing contracts, IEEE Transactions on Information Theory 36(1) (1990), 40-46.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
7
-
-
21844505024
-
Model checking of probabilistic and nondeterministic systems
-
Proc. Foundations of Software Technology and Theoretical Computer Science. (FST/TCS), P. Thiagarajan, ed., Springer
-
A. Bianco and L. De Alfaro, Model checking of probabilistic and nondeterministic systems, in: Proc. Foundations of Software Technology and Theoretical Computer Science. (FST/TCS), P. Thiagarajan, ed., Volume 1026 of LNCS, Springer, 1995, pp. 499-513.
-
(1995)
LNCS
, vol.1026
, pp. 499-513
-
-
Bianco, A.1
De Alfaro, L.2
-
8
-
-
84974588386
-
Timed commitments
-
Proc. 20th Annual Int. Cryptology Conference on Advances in Cryptology (CRYPTO), C. Linnhoff-Popien and H. Hegering, eds, Springer
-
D. Boneh and M. Naor, Timed commitments, in: Proc. 20th Annual Int. Cryptology Conference on Advances in Cryptology (CRYPTO), C. Linnhoff-Popien and H. Hegering, eds, Volume 1880 of LNCS, Springer, 2000, pp. 236-254.
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
9
-
-
33845205962
-
-
Technical Report SSC/1999/39, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland
-
L. Buttyán and J.-P. Hubaux, Toward a formal model of fair exchange - a game theoretic approach, Technical Report SSC/1999/39, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, 1999.
-
(1999)
Toward a Formal Model of Fair Exchange - A Game Theoretic Approach
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
12
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
I. Damgård, Practical and provably secure release of a secret and exchange of signatures, J. Cryptology 8(4) (1995), 201-222.
-
(1995)
J. Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.1
-
15
-
-
33845223165
-
-
Technical Report 231, Computer Science Dept., Technion, Israel
-
S. Even, A protocol for signing contracts, Technical Report 231, Computer Science Dept., Technion, Israel, 1982.
-
(1982)
A Protocol for Signing Contracts
-
-
Even, S.1
-
16
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM 28(6) (1985), 637-647.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
17
-
-
4243796648
-
-
Technical Report 175, Computer Science Dept., Technion, Israel
-
S. Even and Y. Yacobi, Relations among public key signature schemes, Technical Report 175, Computer Science Dept., Technion, Israel, 1980.
-
(1980)
Relations among Public Key Signature Schemes
-
-
Even, S.1
Yacobi, Y.2
-
18
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Proc. CRYPTO'99, M. Wiener, ed., Springer
-
J. Garay, M. Jakobsson and P. MacKenzie, Abuse-free optimistic contract signing, in: Proc. CRYPTO'99, M. Wiener, ed., Volume 1666 of LNCS, Springer, 1999, pp. 449-466.
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.1
Jakobsson, M.2
MacKenzie, P.3
-
19
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, J. ACM 33(4) (1986), 792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
20
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. Gray, Toward a mathematical foundation for information flow security, J. Computer Security 1(3) (1992), 255-294.
-
(1992)
J. Computer Security
, vol.1
, Issue.3
, pp. 255-294
-
-
Gray, J.1
-
21
-
-
0003096318
-
A logic for reasoning about time and probability
-
H. Hansson and B. Jonsson, A logic for reasoning about time and probability, Formal Aspects of Computing 6(5) (1994), 512-535.
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.5
, pp. 512-535
-
-
Hansson, H.1
Jonsson, B.2
-
22
-
-
33745802027
-
PRISM: A tool for automatic verification of probabilistic systems
-
Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), H. Hermanns and J. Palsberg, eds, Springer
-
A. Hinton, M. Kwiatkowska, G. Norman and D. Parker, PRISM: A tool for automatic verification of probabilistic systems, in: Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), H. Hermanns and J. Palsberg, eds, Volume 3920 of LNCS, Springer, 2006, pp. 441-444.
-
(2006)
LNCS
, vol.3920
, pp. 441-444
-
-
Hinton, A.1
Kwiatkowska, M.2
Norman, G.3
Parker, D.4
-
23
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
Proc. CONCUR'01, K. Larsen and M. Nielsen, eds, Springer
-
S. Kremer and J.-F. Raskin, A game-based verification of non-repudiation and fair exchange protocols, in: Proc. CONCUR'01, K. Larsen and M. Nielsen, eds, Volume 2154 of LNCS, Springer, 2001, pp. 551-565.
-
(2001)
LNCS
, vol.2154
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.-F.2
-
25
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Proc. World Congress on Formal Methods, J. Wing, J. Woodcock and J. Davies, eds, Springer
-
P. Lincoln, J. Mitchell, M. Mitchell and A. Scedrov, Probabilistic polynomial-time equivalence and security analysis, in: Proc. World Congress on Formal Methods, J. Wing, J. Woodcock and J. Davies, eds, Volume 1708 of LNCS, Springer, 1999, pp. 776-793.
-
(1999)
LNCS
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
27
-
-
24944538962
-
Certified e-mail with invisible post offices
-
Presented at
-
S. Micali, Certified e-mail with invisible post offices, Presented at RSA Security Conference, 1997.
-
(1997)
RSA Security Conference
-
-
Micali, S.1
-
28
-
-
35248866592
-
Analysis of probabilistic contract signing
-
Proc. 1st International Conference on Formal Aspects of Security (FASec '02), A. Abdallah, P. Ryan and S. Schneider, eds, Springer
-
G. Norman and V. Shmatikov, Analysis of probabilistic contract signing, in: Proc. 1st International Conference on Formal Aspects of Security (FASec '02), A. Abdallah, P. Ryan and S. Schneider, eds, Volume 2629 of LNCS, Springer, 2003, pp. 119-128.
-
(2003)
LNCS
, vol.2629
, pp. 119-128
-
-
Norman, G.1
Shmatikov, V.2
-
29
-
-
84892642318
-
-
PRISM web page, http://www.cs.bham.ac.uk/~dxp/prism/.
-
PRISM Web Page
-
-
-
30
-
-
0020829007
-
Transaction protection by beacons
-
M. Rabin, Transaction protection by beacons, J. Computer and System Sciences 27(2) (1983), 256-267.
-
(1983)
J. Computer and System Sciences
, vol.27
, Issue.2
, pp. 256-267
-
-
Rabin, M.1
-
31
-
-
27144527964
-
-
Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems, P. Panangaden and F. van Breugel, eds, American Mathematical Society
-
J. Rutten, M. Kwiatkowska, G. Norman and D. Parker, Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems, P. Panangaden and F. van Breugel, eds, Volume 23 of CRM Monograph Series, American Mathematical Society, 2004.
-
(2004)
CRM Monograph Series
, vol.23
-
-
Rutten, J.1
Kwiatkowska, M.2
Norman, G.3
Parker, D.4
-
32
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J. Mitchell, Finite-state analysis of two contract signing protocols, Theoretical Computer Science 283(2) (2002), 419-450.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.2
-
33
-
-
0029504906
-
The epistemic representation of information flow security in probabilistic systems
-
P. Syverson and J. Gray, The epistemic representation of information flow security in probabilistic systems, in: Proc. 8th IEEE Computer Security Foundations Workshop, 1995, pp. 152-166.
-
(1995)
Proc. 8th IEEE Computer Security Foundations Workshop
, pp. 152-166
-
-
Syverson, P.1
Gray, J.2
|