-
1
-
-
17644411480
-
-
Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: POPL 2001, pp. 104-115. ACM Press, New York (2001)
-
Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: POPL 2001, pp. 104-115. ACM Press, New York (2001)
-
-
-
-
2
-
-
0003092378
-
A Calculus for Cryptographic Protocols: The Spi Calculus
-
Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148(1), 1-70 (1999)
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
3042529082
-
A Process-algebraic Approach for the Analysis of Probabilistic Non Interference
-
Aldini, A., Bravetti, M., Gorrieri, R.: A Process-algebraic Approach for the Analysis of Probabilistic Non Interference. Journal of Computer Security 12, 191-245 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, pp. 191-245
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
1542347200
-
-
Barrett, C.L., Eidenbenz, S.J., Kroc, L., Marathe, M., Smith, J.P.: Parametric Probabilistic Sensor Network Routing. In: WSNA 2003, pp. 122-131. ACM Press, New York (2003)
-
Barrett, C.L., Eidenbenz, S.J., Kroc, L., Marathe, M., Smith, J.P.: Parametric Probabilistic Sensor Network Routing. In: WSNA 2003, pp. 122-131. ACM Press, New York (2003)
-
-
-
-
5
-
-
37149017073
-
Constraint-based Language for Specifying Service Level Agreements
-
ESOP, Springer, Heidelberg
-
Buscemi, M.G., Montanari, U.: CC-pi: A Constraint-based Language for Specifying Service Level Agreements. In: ESOP 2007. LNCS, vol. 4421, pp. 19-32. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4421
, pp. 19-32
-
-
Buscemi, M.G.1
Montanari, U.2
CC-pi, A.3
-
6
-
-
33744944530
-
Towards Optimal Sleep Scheduling in Sensor Networks for Rare-event Detection. In: IPSN
-
Los Alamitos
-
Cao, Q., Abdelzaher, T., He, T., Stankovic, J.: Towards Optimal Sleep Scheduling in Sensor Networks for Rare-event Detection. In: IPSN 2005, pp. 20-27. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
20-27. IEEE Computer Society Press
, pp. 2005
-
-
Cao, Q.1
Abdelzaher, T.2
He, T.3
Stankovic, J.4
-
7
-
-
0027342054
-
The concurrency workbench: A semantics-based tool for the verification of concurrent systems
-
Cleaveland, R., Parrow, J., Steffen, B.: The concurrency workbench: a semantics-based tool for the verification of concurrent systems. ACM Trans. Program. Lang. Syst. 15(1), 36-72 (1993)
-
(1993)
ACM Trans. Program. Lang. Syst
, vol.15
, Issue.1
, pp. 36-72
-
-
Cleaveland, R.1
Parrow, J.2
Steffen, B.3
-
8
-
-
33750447990
-
Deciding Knowledge in Security Protocols under Equational Theories
-
Cortier, V., Abadi, M.: Deciding Knowledge in Security Protocols under Equational Theories. Theoretical Computer Science 367(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Cortier, V.1
Abadi, M.2
-
10
-
-
0344875573
-
Approximate Non-interference
-
Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate Non-interference. Journal of Computer Security 12, 37-82 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, pp. 37-82
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
12
-
-
0022080529
-
A Randomized protocol for Signing Contracts
-
Even, S., Goldreich, O., Lempel, A.: A Randomized protocol for Signing Contracts. Communications of the ACM 28(6), 637-647 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
84976746763
-
Initial Algebra Semantics and Continuous Algebras
-
Goguen, J.A., Thatcher, J.W., Wagner, E.G., Wright, J.B.: Initial Algebra Semantics and Continuous Algebras. Journal of the ACM 24(1), 68-95 (1977)
-
(1977)
Journal of the ACM
, vol.24
, Issue.1
, pp. 68-95
-
-
Goguen, J.A.1
Thatcher, J.W.2
Wagner, E.G.3
Wright, J.B.4
-
14
-
-
0001901903
-
The Troublesome Probabilistic Powerdomain
-
Elsevier, Amsterdam
-
Jung, A., Tix, R.: The Troublesome Probabilistic Powerdomain. In: Proc. of Workshop on Computation and Approximation. ENTCS, vol. 13, Elsevier, Amsterdam (1998)
-
(1998)
Proc. of Workshop on Computation and Approximation. ENTCS
, vol.13
-
-
Jung, A.1
Tix, R.2
-
15
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6, 53-84 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
16
-
-
18944396423
-
-
Mislove, M.W., Ouakine, J., Worrell, J.: Axioms for Probability and Nondeterminism. In: EXPRESS 2003, 96th edn. ENTCS, pp. 7-28. Elsevier, Amsterdam (2004)
-
Mislove, M.W., Ouakine, J., Worrell, J.: Axioms for Probability and Nondeterminism. In: EXPRESS 2003, 96th edn. ENTCS, pp. 7-28. Elsevier, Amsterdam (2004)
-
-
-
-
20
-
-
33244491452
-
Polynomial-time Process Calculus for the Analysis of Cryptographic Protocols
-
Mitchell, J.C., Ramanathan, A., Scedrov, A., Teague, V.: Polynomial-time Process Calculus for the Analysis of Cryptographic Protocols. Theoretical Computer Science 353(1-3), 118-164 (2006)
-
(2006)
Theoretical Computer Science
, vol.353
, Issue.1-3
, pp. 118-164
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
21
-
-
84947915485
-
-
Niehren, J., Mueller, M.: Constraints for Free in Concurrent Computation. In: Kanchanasut, K., Levy, J.-J. (eds.) ACSC. LNCS, 1023, pp. 171-186. Springer, Heidelberg (1995)
-
Niehren, J., Mueller, M.: Constraints for Free in Concurrent Computation. In: Kanchanasut, K., Levy, J.-J. (eds.) ACSC. LNCS, vol. 1023, pp. 171-186. Springer, Heidelberg (1995)
-
-
-
-
22
-
-
0003462641
-
How to Exchange Secrets by Oblivious Transfer
-
Unpublished manuscript
-
Rabin, M.O.: How to Exchange Secrets by Oblivious Transfer. Unpublished manuscript (1981)
-
(1981)
-
-
Rabin, M.O.1
-
23
-
-
0017930809
-
-
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) Previously released as an MIT Technical Memo in April 1977
-
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) Previously released as an MIT "Technical Memo" in April 1977
-
-
-
-
24
-
-
85047788507
-
-
Saraswat, V. A., Rinard, M.C., Panangaden, P.: Semantic Foundations of Concurrent Constraint Programming. In: POPL 1991, pp. 333-352. ACM Press, New York (1991)
-
Saraswat, V. A., Rinard, M.C., Panangaden, P.: Semantic Foundations of Concurrent Constraint Programming. In: POPL 1991, pp. 333-352. ACM Press, New York (1991)
-
-
-
-
27
-
-
0001609136
-
Probabilistic Simulations for Probabilistic Processes
-
Segala, R., Lynch, N.: Probabilistic Simulations for Probabilistic Processes. Nordic Journal of Computing 2(2), 250-273 (1995)
-
(1995)
Nordic Journal of Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
-
28
-
-
85006239926
-
-
Victor, B., Moller, F.: The Mobility Workbench - A Tool for the pi-Calculus. In: Dill, D.L. (ed.) CAV 1994. LNCS, 818, pp. 428-440. Springer, Heidelberg (1994)
-
Victor, B., Moller, F.: The Mobility Workbench - A Tool for the pi-Calculus. In: Dill, D.L. (ed.) CAV 1994. LNCS, vol. 818, pp. 428-440. Springer, Heidelberg (1994)
-
-
-
|