-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
Martín Abadi. Secrecy by typing in security protocols. Journal of the ACM, 5(46): 18-36, September 1999.
-
(1999)
Journal of the ACM
, vol.5
, Issue.46
, pp. 18-36
-
-
Abadi, M.1
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The Spi calculus
-
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The Spi calculus. Journal of Information and Computation, 148(1):1-70, 1999.
-
(1999)
Journal of Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Martín Abadi and Jan Jurjens. Formal eavesdropping and its computational interpretation. Lecture Notes in Computer Science, 2215:82, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2215
, pp. 82
-
-
Abadi, M.1
Jurjens, J.2
-
4
-
-
35048895107
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Sendai, Japan, Springer-Verlag, Berlin Germany
-
Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP TCS2000, Sendai, Japan, 2000. Springer-Verlag, Berlin Germany.
-
(2000)
IFIP TCS2000
-
-
Abadi, M.1
Rogaway, P.2
-
6
-
-
0035838828
-
Static analysis for the π-calculus with application to security
-
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Static analysis for the π-calculus with application to security. Information and Computation, 168, 2001.
-
(2001)
Information and Computation
, vol.168
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
7
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Alessandra Di Pierro and Herbert Wiklicky, editors, Elsevier
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative analysis of the leakage of confidential data. In Alessandra Di Pierro and Herbert Wiklicky, editors, ENTCS, volume 59. Elsevier, 2002.
-
(2002)
ENTCS
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
8
-
-
0026222347
-
Bisimulation through probabilistic testing
-
September
-
Kim G. Larsen and Arne Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):l-28, September 1991.
-
(1991)
Information and Computation
, vol.94
, Issue.1
-
-
Larsen, K.G.1
Skou, A.2
-
9
-
-
84937417829
-
The interrogator: A tool for cryptographic protocol security
-
Los Angeles, Ca., USA, April IEEE Computer Society Press
-
J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proceedings of the 1984 Symposium on Security and Privacy (SSP '84), pages 134-141, Los Angeles, Ca., USA, April 1990. IEEE Computer Society Press.
-
(1990)
Proceedings of the 1984 Symposium on Security and Privacy (SSP '84)
, pp. 134-141
-
-
Millen, J.K.1
-
12
-
-
84948746951
-
Approximate noninterference
-
Cape Breton, Nova Scotia, Canada
-
Alessandra Di Pierro, Chris Hankin, and Herbert Wiklicky. Approximate noninterference. In Proceedings of CSFW'02 - 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, 2002.
-
(2002)
Proceedings of CSFW'02 - 15th IEEE Computer Security Foundations Workshop
-
-
Pierro, A.D.1
Hankin, C.2
Wiklicky, H.3
-
13
-
-
18544374422
-
A probabilistic formulation of imperfect cryptography
-
N. Busi, R. Gorrieri, and F. Martinelli, editors, June
-
Angelo Troina, Alessandro Aldini, and Roberto Gorrieri. A probabilistic formulation of imperfect cryptography. In N. Busi, R. Gorrieri, and F. Martinelli, editors, Proceedings of Int. Workshop on Issues in Security and Petri Nets (WISP'03), pages 41-55, June 2003.
-
(2003)
Proceedings of Int. Workshop on Issues in Security and Petri Nets (WISP'03)
, pp. 41-55
-
-
Troina, A.1
Aldini, A.2
Gorrieri, R.3
|