메뉴 건너뛰기




Volumn 2987, Issue , 2004, Pages 514-528

A note on the perfect encryption assumption in a process calculus

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 35048850444     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24727-2_36     Document Type: Article
Times cited : (7)

References (13)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • Martín Abadi. Secrecy by typing in security protocols. Journal of the ACM, 5(46): 18-36, September 1999.
    • (1999) Journal of the ACM , vol.5 , Issue.46 , pp. 18-36
    • Abadi, M.1
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The Spi calculus
    • Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The Spi calculus. Journal of Information and Computation, 148(1):1-70, 1999.
    • (1999) Journal of Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Martín Abadi and Jan Jurjens. Formal eavesdropping and its computational interpretation. Lecture Notes in Computer Science, 2215:82, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2215 , pp. 82
    • Abadi, M.1    Jurjens, J.2
  • 4
    • 35048895107 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Sendai, Japan, Springer-Verlag, Berlin Germany
    • Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP TCS2000, Sendai, Japan, 2000. Springer-Verlag, Berlin Germany.
    • (2000) IFIP TCS2000
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • Alessandra Di Pierro and Herbert Wiklicky, editors, Elsevier
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative analysis of the leakage of confidential data. In Alessandra Di Pierro and Herbert Wiklicky, editors, ENTCS, volume 59. Elsevier, 2002.
    • (2002) ENTCS , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 8
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • September
    • Kim G. Larsen and Arne Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):l-28, September 1991.
    • (1991) Information and Computation , vol.94 , Issue.1
    • Larsen, K.G.1    Skou, A.2
  • 9
    • 84937417829 scopus 로고
    • The interrogator: A tool for cryptographic protocol security
    • Los Angeles, Ca., USA, April IEEE Computer Society Press
    • J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proceedings of the 1984 Symposium on Security and Privacy (SSP '84), pages 134-141, Los Angeles, Ca., USA, April 1990. IEEE Computer Society Press.
    • (1990) Proceedings of the 1984 Symposium on Security and Privacy (SSP '84) , pp. 134-141
    • Millen, J.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.