-
1
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
Bergstra, J.A., Klop, J.W.: Algebra of communicating processes with abstraction. Theoretical Computer Science 37(1), 77-121 (1985)
-
(1985)
Theoretical Computer Science
, vol.37
, Issue.1
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
2
-
-
84937549115
-
The disavantages of free mix routes and how to overcome them
-
Federrath, H, ed, Proc. Workshop on Design Issues in Anonymity and Unobservability, Springer, Heidelberg
-
Berthold, O., Pfiztmann, A., Standtke, R.: The disavantages of free mix routes and how to overcome them. In: Federrath, H. (ed.) Proc. Workshop on Design Issues in Anonymity and Unobservability. LNCS, vol. 2009, pp. 30-45. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 30-45
-
-
Berthold, O.1
Pfiztmann, A.2
Standtke, R.3
-
3
-
-
27244455746
-
Probabilistic anonymity
-
Abadi, M, de Alfaro, L, eds, CONCUR 2005, Springer, Heidelberg
-
Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171-185. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
4
-
-
84958758114
-
-
Blom, S.C.C., Fokkink, W.J., Groote, J.F., van Langevelde, I., Lisser, B., van de Pol, J.C.: μCRL: A toolset for analysing algebraic specifications. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, 2102, pp. 250-254. Springer, Heidelberg (2001)
-
Blom, S.C.C., Fokkink, W.J., Groote, J.F., van Langevelde, I., Lisser, B., van de Pol, J.C.: μCRL: A toolset for analysing algebraic specifications. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 250-254. Springer, Heidelberg (2001)
-
-
-
-
5
-
-
27644432767
-
Analysing the BKE-security protocol with μCRL
-
Blom, S.C.C., Groote, J.F., Mauw, S., Serebrenik, A.: Analysing the BKE-security protocol with μCRL. In: Proc. 6th AMAST Workshop on Real-Time Systems. ENTCS, vol. 139, pp. 49-90 (2004)
-
(2004)
Proc. 6th AMAST Workshop on Real-Time Systems. ENTCS
, vol.139
, pp. 49-90
-
-
Blom, S.C.C.1
Groote, J.F.2
Mauw, S.3
Serebrenik, A.4
-
6
-
-
13844322359
-
A distributed algorithm for strong bisimulation reduction of state spaces
-
Blom, S.C.C., Orzan, S.M.: A distributed algorithm for strong bisimulation reduction of state spaces. Software Tools for Technology Transfer 7(1), 74-86 (2005)
-
(2005)
Software Tools for Technology Transfer
, vol.7
, Issue.1
, pp. 74-86
-
-
Blom, S.C.C.1
Orzan, S.M.2
-
7
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988)
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
8
-
-
33750561653
-
Analysing the mute anonymous file-sharing system using the pi-calculus
-
Najm, E, Pradat-Peyre, J.F, Donzeau-Gouge, V.V, eds, FORTE 2006, Springer, Heidelberg
-
Chothia, T.: Analysing the mute anonymous file-sharing system using the pi-calculus. In: Najm, E., Pradat-Peyre, J.F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol. 4229, pp. 115-130. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4229
, pp. 115-130
-
-
Chothia, T.1
-
11
-
-
84957800033
-
Towards measuring anonymity
-
PET, Springer, Heidelberg
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
12
-
-
38349077302
-
-
van Eijck, J., Orzan, S.M.: Epistemic verification of anonymity. In: Proc. Views On Designing Complex Architectures (VODCA'06) (2006)
-
van Eijck, J., Orzan, S.M.: Epistemic verification of anonymity. In: Proc. Views On Designing Complex Architectures (VODCA'06) (2006)
-
-
-
-
13
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
AUSCRYPT, Springer, Heidelberg
-
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: AUSCRYPT 1992. LNCS, vol. 718, pp. 244-251. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
14
-
-
31844437820
-
Provable anonymity
-
ACM Press, New York
-
Garcia, F.D., Hasuo, I., Pieters, W., van Rossum, P.: Provable anonymity. In: Proc. 3rd ACM Workshop on Formal Methods in Security Engineering, pp. 63-72. ACM Press, New York (2005)
-
(2005)
Proc. 3rd ACM Workshop on Formal Methods in Security Engineering
, pp. 63-72
-
-
Garcia, F.D.1
Hasuo, I.2
Pieters, W.3
van Rossum, P.4
-
15
-
-
0002278376
-
Algebraic process verification
-
Bergstra, J.A, Ponse, A, Smolka, S.A, eds, North-Holland, pp
-
Groote, J.F., Reniers, M.A.: Algebraic process verification. In: Bergstra, J.A., Ponse, A., Smolka, S.A. (eds.) Handbook of Process Algebra, North-Holland, pp. 1151-1208 (2001)
-
(2001)
Handbook of Process Algebra
, pp. 1151-1208
-
-
Groote, J.F.1
Reniers, M.A.2
-
17
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12(1), 3-36 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
18
-
-
38349050361
-
On the complexity of deciding behavioural equivalences and preorders - a survey
-
Technical Report RS-96-39, BRICS
-
Hüttel, H., Shukla, S.: On the complexity of deciding behavioural equivalences and preorders - a survey. Technical Report RS-96-39, BRICS (1996)
-
(1996)
-
-
Hüttel, H.1
Shukla, S.2
-
19
-
-
23144432349
-
-
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
-
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
33745782313
-
MCMAS: A tool for verifying multi-agent systems
-
Hermanns, H, Palsberg, J, eds, TACAS 2006 and ETAPS 2006, Springer, Heidelberg
-
Lomuscio, A., Raimondi, F.: MCMAS: A tool for verifying multi-agent systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006 and ETAPS 2006. LNCS, vol. 3920, pp. 450-454. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3920
, pp. 450-454
-
-
Lomuscio, A.1
Raimondi, F.2
-
21
-
-
31844446595
-
-
Mauw, S., Verschuren, J., de Vink, E.P.: A formalization of anonymity and onion routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, 3193, pp. 109-124. Springer, Heidelberg (2004)
-
Mauw, S., Verschuren, J., de Vink, E.P.: A formalization of anonymity and onion routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 109-124. Springer, Heidelberg (2004)
-
-
-
-
22
-
-
38349049442
-
-
Mauw, S., Verschuren, J., de Vink, E.P.: Data anonymity in the FOO voting scheme. In: Proc. Views On Designing Complex Architectures (VODCA'06) (2006)
-
Mauw, S., Verschuren, J., de Vink, E.P.: Data anonymity in the FOO voting scheme. In: Proc. Views On Designing Complex Architectures (VODCA'06) (2006)
-
-
-
-
23
-
-
0004256761
-
-
PhD thesis, Georgia Institute of Technology
-
Meritt, M.J.: Cryptographic Protocols. PhD thesis, Georgia Institute of Technology (1983)
-
(1983)
Cryptographic Protocols
-
-
Meritt, M.J.1
-
24
-
-
4944250729
-
Symbolic model checking the knowledge of the dining cryptographers
-
IEEE Computer Society Press, Los Alamitos
-
van der Meyden, R., Su, K.: Symbolic model checking the knowledge of the dining cryptographers. In: Proc. 17th IEEE Computer Security Foundations Workshop, pp. 280-291. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proc. 17th IEEE Computer Security Foundations Workshop
, pp. 280-291
-
-
van der Meyden, R.1
Su, K.2
-
25
-
-
84925465034
-
-
Pang, J.: Analysis of a security protocol in μCRL. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, 2495, pp. 396-400. Springer, Heidelberg (2002)
-
Pang, J.: Analysis of a security protocol in μCRL. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, vol. 2495, pp. 396-400. Springer, Heidelberg (2002)
-
-
-
-
26
-
-
38349075207
-
-
Pfitzmann, A., Hansen, M.: Anonymity, unobservability, and pseudonymity: A proposal for terminology, draft v0.23 (August 2005)
-
Pfitzmann, A., Hansen, M.: Anonymity, unobservability, and pseudonymity: A proposal for terminology, draft v0.23 (August 2005)
-
-
-
-
28
-
-
84949756689
-
CSP and anonymity
-
Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, Computer Security, ESORICS, 1146, pp, Springer, Heidelberg
-
Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, pp. 198-218. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.96
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
29
-
-
84957802536
-
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
-
-
-
30
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security 12(3/4), 355-377 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
|