-
2
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STAGS), Springer
-
M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STAGS), volume 2607 of LNCS, pages 675-686. Springer, 2003.
-
(2003)
LNCS
, vol.2607
, pp. 675-686
-
-
Backes, M.1
Jacobi, C.2
-
3
-
-
84957037045
-
Computational probabilistic non-interference
-
Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
-
M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of LNCS, pages 1-23. Springer, 2002.
-
(2002)
LNCS
, vol.2502
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
5
-
-
84948731889
-
Polynomial fairness and liveness
-
M. Backes, B. Pfitzmann, M. Steiner, and M. Waidner. Polynomial fairness and liveness. In Proc. 15th IEEE Computer Security Foundations Workshop (CSFW), pages 160-174, 2002.
-
(2002)
Proc. 15th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 160-174
-
-
Backes, M.1
Pfitzmann, B.2
Steiner, M.3
Waidner, M.4
-
6
-
-
33746365751
-
Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):15-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 15-122
-
-
Beaver, D.1
-
7
-
-
84983089516
-
The security of cipherblock chaining
-
Advances in Cryptology: CRYPTO '94, Springer
-
M. Bellare, J. Killian, and P. Rogaway. The security of cipherblock chaining. In Advances in Cryptology: CRYPTO '94, volume 839 of LNCS, pages 341-358. Springer, 1994.
-
(1994)
LNCS
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Killian, J.2
Rogaway, P.3
-
8
-
-
84948986458
-
Optimal asymmetric encryption
-
Advances in Cryptology: EUROCRYPT '94, Springer
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology: EUROCRYPT '94, volume 950 of LNCS, pages 92-111. Springer, 1994.
-
(1994)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 3(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Extended version in Cryptology ePrint Archive, Report 2000/67
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
-
(2001)
Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 136-145
-
-
Canetti, R.1
-
11
-
-
2642548302
-
Secure protocol composition (extended abstract)
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition (extended abstract). In Proc. 1st ACM Workshop on Formal Methods in Security Engineering (FMSE), pages 11-23, 2003.
-
(2003)
Proc. 1st ACM Workshop on Formal Methods in Security Engineering (FMSE)
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
14
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology: CRYPTO '90, Springer
-
S. Goldvvasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology: CRYPTO '90, volume 537 of LNCS, pages 77-93. Springer, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldvvasser, S.1
Levin, L.2
-
16
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
17
-
-
0003843704
-
-
International Series in Computer Science, Prentice Hall, Hemel Hempstead
-
C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Hemel Hempstead, 1985.
-
(1985)
Communicating Sequential Processes
-
-
Hoare, C.A.R.1
-
19
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
20
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Proc. 8th Symposium on Formal Methods Europe (FME1999), Springer
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In Proc. 8th Symposium on Formal Methods Europe (FME1999), volume 1708 of LNCS, pages 776-793. Springer, 1999.
-
(1999)
LNCS
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
21
-
-
0004215089
-
-
Morgan Kaufmann Publishers, San Francisco
-
N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.1
-
23
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
D. McCullough. Specifications for multi-level security and a hook-up property. In Proc. 8th IEEE Symposium on Security & Privacy, pages 161-166, 1987.
-
(1987)
Proc. 8th IEEE Symposium on Security & Privacy
, pp. 161-166
-
-
McCullough, D.1
-
25
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. 15th IEEE Symposium on Security & Privacy, pages 79-93, 1994.
-
(1994)
Proc. 15th IEEE Symposium on Security & Privacy
, pp. 79-93
-
-
McLean, J.1
-
26
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" security properties
-
J. McLean. A general theory of composition for a class of "possibilistic" security properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
27
-
-
84974655726
-
Secure computation
-
Advances in Cryptology: CRYPTO '91, Springer
-
S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 392-404. Springer, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
0003537586
-
A general framework for formal notions of "secure" systems
-
University of Hildesheim, Apr.
-
B. Pfitzmann and M. Waidner. A general framework for formal notions of "secure" systems. Research Report 11/94, University of Hildesheim, Apr. 1994. http://www.semper.org/sirene/lit/abstr94.html\#PfWa_94.
-
(1994)
Research Report 11/94
-
-
Pfitzmann, B.1
Waidner, M.2
-
30
-
-
0034447081
-
Composition and integrity preservation of secure reactive systems
-
Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000
-
B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM Conference on Computer and Communications Security, pages 245-254, 2000. Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://BWW.semper.org/s irene/publ/PfSWl_00ReactSimulIBM.ps.gz.
-
(2000)
Proc. 7th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Pfitzmann, B.1
Waidner, M.2
-
31
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Extended version in Cryptology ePrint Archive, Report
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version in Cryptology ePrint Archive, Report 2000/066, http : //eprint.iacr.org/.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
32
-
-
0026884658
-
Trace-based network proof systems: Expressiveness and completeness
-
J. Widom, D. Gries, and R B. Schneider. Trace-based network proof systems: Expressiveness and completeness. ACM Transactions on Programming Languages and Systems, 14(3):396-416, 1992.
-
(1992)
ACM Transactions on Programming Languages and Systems
, vol.14
, Issue.3
, pp. 396-416
-
-
Widom, J.1
Gries, D.2
Schneider, R.B.3
|