-
1
-
-
84943242087
-
Security analysis of a probabilistic non-repudiation protocol
-
Proc. PAPM/PROBMIV'02, Springer-Verlag
-
A. Aldini and R. Gorrieri. Security analysis of a probabilistic non-repudiation protocol. In Proc. PAPM/PROBMIV'02, volume 2399 of LNCS, pages 17-36. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2399
, pp. 17-36
-
-
Aldini, A.1
Gorrieri, R.2
-
4
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Selected Areas in Communications, 18(4):593-610, 2000.
-
(2000)
IEEE Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
0032131465
-
Model checking for a probabilistic branching time logic with fairness
-
C. Baier and M. Kwiatkowska. Model checking for a probabilistic branching time logic with fairness. Distributed Computing, 11 (3):125-155, 1998.
-
(1998)
Distributed Computing
, vol.11
, Issue.3
, pp. 125-155
-
-
Baier, C.1
Kwiatkowska, M.2
-
6
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, 36(1):40-46, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
7
-
-
21844505024
-
Model checking of probabilistic and nondeterministic systems. n
-
Proc. Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag
-
A. Bianco and L. de Alfaro. Model checking of probabilistic and nondeterministic systems. In Proc. Foundations of Software Technology and Theoretical Computer Science, volume 1026 of LNCS, pages 499-513. Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.1026
, pp. 499-513
-
-
Bianco, A.1
De Alfaro, L.2
-
8
-
-
84974588386
-
Timed commitments
-
Proc. CRYPTO'00, Springer-Verlag
-
D. Boneh and M. Naor. Timed commitments. In Proc. CRYPTO'00, volume 1880 of LNCS, pages 236-254. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
12
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
I. Damgård. Practical and provably secure release of a secret and exchange of signatures. J. Cryptology, 8(4):201-222, 1995.
-
(1995)
J. Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.1
-
15
-
-
33845223165
-
-
Technical Report 231, Computer Science Dept., Technion, Israel
-
S. Even. A protocol for signing contracts. Technical Report 231, Computer Science Dept., Technion, Israel, 1982.
-
(1982)
A Protocol for Signing Contracts
-
-
Even, S.1
-
16
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Proc. CRYPTO'99, Springer-Verlag
-
J. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Proc. CRYPTO'99, volume 1666 of LNCS, pages 449-466. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.1
Jakobsson, M.2
MacKenzie, P.3
-
19
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
20
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. Gray. Toward a mathematical foundation for information flow security. J. Computer Security, 1(3):255-294, 1992.
-
(1992)
J. Computer Security
, vol.1
, Issue.3
, pp. 255-294
-
-
Gray, J.1
-
21
-
-
0003096318
-
A logic for reasoning about time and probability
-
H. Hansson and B. Jonsson. A logic for reasoning about time and probability. Formal Aspects of Computing, 6(5):512-535, 1994.
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.5
, pp. 512-535
-
-
Hansson, H.1
Jonsson, B.2
-
22
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
Proc. CONCUR'01, Springer-Verlag
-
S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In Proc. CONCUR'01, volume 2154 of LNCS, pages 551-565. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2154
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.-F.2
-
24
-
-
84863981780
-
PRISM: Probabilistic, symbolic model checker
-
Proc. TOOLS'02, Springer-Verlag
-
M. Kwiatkowska, G. Norman, and D. Parker. PRISM: Probabilistic, symbolic model checker. In Proc. TOOLS'02, volume 2324 of LNCS, pages 200-204. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2324
, pp. 200-204
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
25
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Proc. World Congress on Formal Methods, Springer-Verlag
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In Proc. World Congress on Formal Methods, volume 1708 of LNCS, pages 776-793. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
27
-
-
24944538962
-
Certified e-mail with invisible post offices
-
S. Micali. Certified e-mail with invisible post offices. Presented at RSA Security Conference, 1997.
-
(1997)
RSA Security Conference
-
-
Micali, S.1
-
28
-
-
35248828671
-
-
PRISM web page
-
PRISM web page. http://www.cs.bham.ac.uk/~dxp/prism/.
-
-
-
-
29
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.2
-
30
-
-
0029504906
-
The epistemic representation of information flow security in probabilistic systems
-
P. Syverson and J. Gray. The epistemic representation of information flow security in probabilistic systems. In Proc. 8th IEEE Computer Security Foundations Workshop, pages 152-166, 1995.
-
(1995)
Proc. 8th IEEE Computer Security Foundations Workshop
, pp. 152-166
-
-
Syverson, P.1
Gray, J.2
|