-
1
-
-
84878558984
-
Protection in programming-language translations
-
25th International Colloquium on Automata, Languages and Programming, of, Springer-Verlag
-
M. Abadi. Protection in programming-language translations. In 25th International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 868-883. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1443
, pp. 868-883
-
-
Abadi, M.1
-
2
-
-
0002652530
-
Security protocols and their properties
-
F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, IOS Press
-
M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, NATO Science Series, pages 39-60. IOS Press, 2000.
-
(2000)
NATO Science Series
, pp. 39-60
-
-
Abadi, M.1
-
3
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Apr
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-415, Apr. 2003.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
0037052276
-
Secure implementation of channel abstractions
-
Apr
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, Apr. 2002.
-
(2002)
Information and Computation
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
6
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
8
-
-
33746364838
-
Cryptographically sound implementations for communicating processes (extended abstract)
-
33rd International Colloquium on Automata, Languages and Programming, of, Springer-Verlag, July
-
P. Adão and C. Fournet. Cryptographically sound implementations for communicating processes (extended abstract). In 33rd International Colloquium on Automata, Languages and Programming, volume 4052 of LNCS, pages 83-94. Springer-Verlag, July 2006.
-
(2006)
LNCS
, vol.4052
, pp. 83-94
-
-
Adão, P.1
Fournet, C.2
-
12
-
-
19744374538
-
Symmetric authentication within a simulatable cryptographic library
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. International Journal of Information Security, 4(3):135-154, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 135-154
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Encrocrypt 2001, of, Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Encrocrypt 2001, volume 2045 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
-
-
Canetti, R.1
Krawczyk, H.2
-
14
-
-
12444303307
-
Secrecy and group creation
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. Information and Computation, 196(2): 127-155, 2005.
-
(2005)
Information and Computation
, vol.196
, Issue.2
, pp. 127-155
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
15
-
-
24644447402
-
A type discipline for authorization policies
-
14th European Symposium on Programming, of, Springer
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In 14th European Symposium on Programming, volume 3444 of LNCS, pages 141-156. Springer, 2005.
-
(2005)
LNCS
, vol.3444
, pp. 141-156
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
16
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2004.
-
(2004)
J. Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
17
-
-
33745787443
-
-
P. Laud. Secrecy types for a simulatable cryptographic library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, 2005. Also Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
-
P. Laud. Secrecy types for a simulatable cryptographic library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, 2005. Also Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
-
-
-
-
18
-
-
85026563474
-
On asynchrony in name-passing calculi
-
25th International Colloquium on Automata, Languages and Programming, of, Springer-Verlag
-
M. Merro and D. Sangiorgi. On asynchrony in name-passing calculi. In 25th International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 856-867. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1443
, pp. 856-867
-
-
Merro, M.1
Sangiorgi, D.2
|