메뉴 건너뛰기




Volumn 2629, Issue , 2003, Pages 81-96

Analysis of probabilistic contract signing

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 35248866592     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40981-6_9     Document Type: Article
Times cited : (16)

References (31)
  • 1
    • 84943242087 scopus 로고    scopus 로고
    • Security analysis of a probabilistic non-repudiation protocol
    • Proc. PAPM/PROBMIV'02, Springer-Verlag
    • A. Aldini and R. Gorrieri. Security analysis of a probabilistic non-repudiation protocol. In Proc. PAPM/PROBMIV'02, volume 2399 of LNCS, pages 17-36. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2399 , pp. 17-36
    • Aldini, A.1    Gorrieri, R.2
  • 5
    • 0032131465 scopus 로고    scopus 로고
    • Model checking for a probabilistic branching time logic with fairness
    • C. Baier and M. Kwiatkowska. Model checking for a probabilistic branching time logic with fairness. Distributed Computing, 11 (3):125-155, 1998.
    • (1998) Distributed Computing , vol.11 , Issue.3 , pp. 125-155
    • Baier, C.1    Kwiatkowska, M.2
  • 7
    • 21844505024 scopus 로고
    • Model checking of probabilistic and nondeterministic systems. n
    • Proc. Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag
    • A. Bianco and L. de Alfaro. Model checking of probabilistic and nondeterministic systems. In Proc. Foundations of Software Technology and Theoretical Computer Science, volume 1026 of LNCS, pages 499-513. Springer-Verlag, 1995.
    • (1995) LNCS , vol.1026 , pp. 499-513
    • Bianco, A.1    De Alfaro, L.2
  • 8
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Proc. CRYPTO'00, Springer-Verlag
    • D. Boneh and M. Naor. Timed commitments. In Proc. CRYPTO'00, volume 1880 of LNCS, pages 236-254. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 12
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I. Damgård. Practical and provably secure release of a secret and exchange of signatures. J. Cryptology, 8(4):201-222, 1995.
    • (1995) J. Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 15
    • 33845223165 scopus 로고
    • Technical Report 231, Computer Science Dept., Technion, Israel
    • S. Even. A protocol for signing contracts. Technical Report 231, Computer Science Dept., Technion, Israel, 1982.
    • (1982) A Protocol for Signing Contracts
    • Even, S.1
  • 16
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 18
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • Proc. CRYPTO'99, Springer-Verlag
    • J. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Proc. CRYPTO'99, volume 1666 of LNCS, pages 449-466. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 449-466
    • Garay, J.1    Jakobsson, M.2    MacKenzie, P.3
  • 19
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 20
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. Gray. Toward a mathematical foundation for information flow security. J. Computer Security, 1(3):255-294, 1992.
    • (1992) J. Computer Security , vol.1 , Issue.3 , pp. 255-294
    • Gray, J.1
  • 21
    • 0003096318 scopus 로고
    • A logic for reasoning about time and probability
    • H. Hansson and B. Jonsson. A logic for reasoning about time and probability. Formal Aspects of Computing, 6(5):512-535, 1994.
    • (1994) Formal Aspects of Computing , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 22
    • 84944080333 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • Proc. CONCUR'01, Springer-Verlag
    • S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In Proc. CONCUR'01, volume 2154 of LNCS, pages 551-565. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2154 , pp. 551-565
    • Kremer, S.1    Raskin, J.-F.2
  • 24
    • 84863981780 scopus 로고    scopus 로고
    • PRISM: Probabilistic, symbolic model checker
    • Proc. TOOLS'02, Springer-Verlag
    • M. Kwiatkowska, G. Norman, and D. Parker. PRISM: Probabilistic, symbolic model checker. In Proc. TOOLS'02, volume 2324 of LNCS, pages 200-204. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2324 , pp. 200-204
    • Kwiatkowska, M.1    Norman, G.2    Parker, D.3
  • 25
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • Proc. World Congress on Formal Methods, Springer-Verlag
    • P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In Proc. World Congress on Formal Methods, volume 1708 of LNCS, pages 776-793. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1708 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 27
    • 24944538962 scopus 로고    scopus 로고
    • Certified e-mail with invisible post offices
    • S. Micali. Certified e-mail with invisible post offices. Presented at RSA Security Conference, 1997.
    • (1997) RSA Security Conference
    • Micali, S.1
  • 28
    • 35248828671 scopus 로고    scopus 로고
    • PRISM web page
    • PRISM web page. http://www.cs.bham.ac.uk/~dxp/prism/.
  • 29
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • V. Shmatikov and J. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.2
  • 30
    • 0029504906 scopus 로고
    • The epistemic representation of information flow security in probabilistic systems
    • P. Syverson and J. Gray. The epistemic representation of information flow security in probabilistic systems. In Proc. 8th IEEE Computer Security Foundations Workshop, pages 152-166, 1995.
    • (1995) Proc. 8th IEEE Computer Security Foundations Workshop , pp. 152-166
    • Syverson, P.1    Gray, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.