-
1
-
-
18544383932
-
Measuring the confinement of probabilistic systems
-
Di Pierro A., Hankin C., and Wiklicky H. Measuring the confinement of probabilistic systems. Theor. Comput. Sci. 340 1 (2005) 3-56
-
(2005)
Theor. Comput. Sci.
, vol.340
, Issue.1
, pp. 3-56
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
3
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
van Glabbeek R., Smolka S., and Steffen B. Reactive, generative and stratified models of probabilistic processes. Inform. Comput. 121 (1995) 59-80
-
(1995)
Inform. Comput.
, vol.121
, pp. 59-80
-
-
van Glabbeek, R.1
Smolka, S.2
Steffen, B.3
-
4
-
-
84937444411
-
Probabilistic simulations for probabilistic processes
-
Proceedings of CONCUR 94, Springer Verlag
-
Segala R., and Lynch N. Probabilistic simulations for probabilistic processes. Proceedings of CONCUR 94. Lecture Notes in Computer Science vol. 836 (1994), Springer Verlag 481-496
-
(1994)
Lecture Notes in Computer Science
, vol.836
, pp. 481-496
-
-
Segala, R.1
Lynch, N.2
-
6
-
-
18444384746
-
-
Elsevier Science, Amsterdam (Ch. 11, pp. 685-710, see [24])
-
Jonsson B., Yi W., and Larsen K. Probabilistic Extentions of Process Algebras (2001), Elsevier Science, Amsterdam (Ch. 11, pp. 685-710, see [24])
-
(2001)
Probabilistic Extentions of Process Algebras
-
-
Jonsson, B.1
Yi, W.2
Larsen, K.3
-
7
-
-
35248857469
-
Quantitative relations and approximate process equivalences
-
Proceedings of CONCUR'03. Lugiez D. (Ed), Springer Verlag
-
Di Pierro A., Hankin C., and Wiklicky H. Quantitative relations and approximate process equivalences. In: Lugiez D. (Ed). Proceedings of CONCUR'03. Lecture Notes in Computer Science vol. 2761 (2003), Springer Verlag 508-522
-
(2003)
Lecture Notes in Computer Science
, vol.2761
, pp. 508-522
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
8
-
-
0015672289
-
A note on the confinement problem
-
Lampson B. A note on the confinement problem. Commun. ACM 16 10 (1973) 613-615
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
11
-
-
0035067847
-
Process algebra and non-interference
-
(special Issue on CSFW-12)
-
Ryan P., and Schneider S. Process algebra and non-interference. J. Comput. Security 9 1/2 (2001) 75-103 (special Issue on CSFW-12)
-
(2001)
J. Comput. Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.1
Schneider, S.2
-
12
-
-
0026222347
-
Bisimulation through probabilistic testing
-
Larsen K., and Skou A. Bisimulation through probabilistic testing. Inform. Comput. 94 (1991) 1-28
-
(1991)
Inform. Comput.
, vol.94
, pp. 1-28
-
-
Larsen, K.1
Skou, A.2
-
15
-
-
84988393004
-
Classification of security properties (Part I: Information Flow)
-
Foundations of Security Analysis and Design, Tutorial Lectures, Springer Verlag
-
Focardi R., and Gorrieri R. Classification of security properties (Part I: Information Flow). Foundations of Security Analysis and Design, Tutorial Lectures. Lecture Notes in Computer Science vol. 2171 (2001), Springer Verlag 331-396
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
16
-
-
0023566630
-
Three partition refinement algorithms
-
Paige R., and Tarjan R. Three partition refinement algorithms. SIAM J. Comput. 16 6 (1987) 973-989
-
(1987)
SIAM J. Comput.
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.2
-
17
-
-
0003062448
-
Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
-
Advances in Cryptology, CRYPTO '95. Coppersmith D. (Ed), Springer-Verlag
-
Kocher P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks. In: Coppersmith D. (Ed). Advances in Cryptology, CRYPTO '95. Lecture Notes in Computer Science vol. 963 (1995), Springer-Verlag 171-183
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 171-183
-
-
Kocher, P.1
-
18
-
-
0034449227
-
Timing attacks on web privacy
-
ACM, Athens, Greece
-
Felten E.W., and Schneider M.A. Timing attacks on web privacy. Proceedings of CCS'00 (2000), ACM, Athens, Greece 25-32
-
(2000)
Proceedings of CCS'00
, pp. 25-32
-
-
Felten, E.W.1
Schneider, M.A.2
-
19
-
-
34250654392
-
-
R.J. Corin, S. Etalle, P.H. Hartel, A. Mader, Timed analysis of security protocols, J. Comput. Security, in press.
-
-
-
-
20
-
-
84957795309
-
Private authentication
-
2nd Int. Workshop on Privacy Enhancing Technologies. Dingledine R., and Syverson P.F. (Eds), Springer Verlag
-
Abadi M. Private authentication. In: Dingledine R., and Syverson P.F. (Eds). 2nd Int. Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science vol. 2482 (2002), Springer Verlag 27-40
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 27-40
-
-
Abadi, M.1
-
21
-
-
34250655219
-
Automated analysis of timed security: a case study on web privacy
-
Gorrieri R., Lanotte R., Maggiolo-Schettini A., Martinelli F., Tini S., and Tronci E. Automated analysis of timed security: a case study on web privacy. J. Inform. Security 2 (2004) 168-186
-
(2004)
J. Inform. Security
, vol.2
, pp. 168-186
-
-
Gorrieri, R.1
Lanotte, R.2
Maggiolo-Schettini, A.3
Martinelli, F.4
Tini, S.5
Tronci, E.6
-
22
-
-
1442311382
-
A simple framework for real-time cryptographic protocol analysis with composition proof rules
-
Gorrieri R., and Martinelli F. A simple framework for real-time cryptographic protocol analysis with composition proof rules. Sci. Comput. Program. 50 (2004) 23-49
-
(2004)
Sci. Comput. Program.
, vol.50
, pp. 23-49
-
-
Gorrieri, R.1
Martinelli, F.2
-
23
-
-
17744377974
-
-
M. Buchholtz, S. Gilmore, J. Hillston, F. Nielson, Securing statically-verified communications protocols against timing attacks, in: 1st International Workshop on Practical Applications of Stochastic Modelling (PASM 2004), vol. 128, 2005, pp. 123-143.
-
-
-
-
24
-
-
0004287147
-
-
Bergstra J., Ponse A., and Smolka S. (Eds), Elsevier Science, Amsterdam
-
In: Bergstra J., Ponse A., and Smolka S. (Eds). Handbook of Process Algebra (2001), Elsevier Science, Amsterdam
-
(2001)
Handbook of Process Algebra
-
-
|